Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2021-47206 (GCVE-0-2021-47206)
Vulnerability from cvelistv5
Published
2024-04-10 18:56
      Modified
2025-05-04 07:06
      
          Severity ?
        
        
          VLAI Severity ?
        
        
          EPSS score ?
        
        Summary
In the Linux kernel, the following vulnerability has been resolved:
usb: host: ohci-tmio: check return value after calling platform_get_resource()
It will cause null-ptr-deref if platform_get_resource() returns NULL,
we need check the return value.
            
          
        References
          Impacted products
        | Vendor | Product | Version | ||
|---|---|---|---|---|
| Linux | Linux | Version: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 Version: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 Version: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 Version: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 Version: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 Version: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 Version: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 Version: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 | ||
{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2021-47206",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-06-21T16:04:28.537422Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-06-21T16:04:37.774Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T05:32:07.335Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/28e016e02118917e50a667bc72fb80098cf2b460"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/2f18f97a1a787154a372c0738f1576f14b693d91"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/bb6ed2e05eb6e8619b30fa854f9becd50c11723f"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/951b8239fd24678b56c995c5c0456ab12e059d19"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/f98986b7acb4219f95789095eced93ed69d81d35"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/2474eb7fc3bfbce10f7b8ea431fcffe5dd5f5100"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/065334f6640d074a1caec2f8b0091467a22f9483"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/9eff2b2e59fda25051ab36cd1cb5014661df657b"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Linux",
          "programFiles": [
            "drivers/usb/host/ohci-tmio.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "lessThan": "28e016e02118917e50a667bc72fb80098cf2b460",
              "status": "affected",
              "version": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2",
              "versionType": "git"
            },
            {
              "lessThan": "2f18f97a1a787154a372c0738f1576f14b693d91",
              "status": "affected",
              "version": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2",
              "versionType": "git"
            },
            {
              "lessThan": "bb6ed2e05eb6e8619b30fa854f9becd50c11723f",
              "status": "affected",
              "version": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2",
              "versionType": "git"
            },
            {
              "lessThan": "951b8239fd24678b56c995c5c0456ab12e059d19",
              "status": "affected",
              "version": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2",
              "versionType": "git"
            },
            {
              "lessThan": "f98986b7acb4219f95789095eced93ed69d81d35",
              "status": "affected",
              "version": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2",
              "versionType": "git"
            },
            {
              "lessThan": "2474eb7fc3bfbce10f7b8ea431fcffe5dd5f5100",
              "status": "affected",
              "version": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2",
              "versionType": "git"
            },
            {
              "lessThan": "065334f6640d074a1caec2f8b0091467a22f9483",
              "status": "affected",
              "version": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2",
              "versionType": "git"
            },
            {
              "lessThan": "9eff2b2e59fda25051ab36cd1cb5014661df657b",
              "status": "affected",
              "version": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2",
              "versionType": "git"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "Linux",
          "programFiles": [
            "drivers/usb/host/ohci-tmio.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "lessThanOrEqual": "4.4.*",
              "status": "unaffected",
              "version": "4.4.293",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "4.9.*",
              "status": "unaffected",
              "version": "4.9.291",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "4.14.*",
              "status": "unaffected",
              "version": "4.14.256",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "4.19.*",
              "status": "unaffected",
              "version": "4.19.218",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.4.*",
              "status": "unaffected",
              "version": "5.4.162",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.10.*",
              "status": "unaffected",
              "version": "5.10.82",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.15.*",
              "status": "unaffected",
              "version": "5.15.5",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "*",
              "status": "unaffected",
              "version": "5.16",
              "versionType": "original_commit_for_fix"
            }
          ]
        }
      ],
      "cpeApplicability": [
        {
          "nodes": [
            {
              "cpeMatch": [
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "4.4.293",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "4.9.291",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "4.14.256",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "4.19.218",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.4.162",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.10.82",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.15.5",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.16",
                  "vulnerable": true
                }
              ],
              "negate": false,
              "operator": "OR"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: host: ohci-tmio: check return value after calling platform_get_resource()\n\nIt will cause null-ptr-deref if platform_get_resource() returns NULL,\nwe need check the return value."
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-05-04T07:06:23.050Z",
        "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
        "shortName": "Linux"
      },
      "references": [
        {
          "url": "https://git.kernel.org/stable/c/28e016e02118917e50a667bc72fb80098cf2b460"
        },
        {
          "url": "https://git.kernel.org/stable/c/2f18f97a1a787154a372c0738f1576f14b693d91"
        },
        {
          "url": "https://git.kernel.org/stable/c/bb6ed2e05eb6e8619b30fa854f9becd50c11723f"
        },
        {
          "url": "https://git.kernel.org/stable/c/951b8239fd24678b56c995c5c0456ab12e059d19"
        },
        {
          "url": "https://git.kernel.org/stable/c/f98986b7acb4219f95789095eced93ed69d81d35"
        },
        {
          "url": "https://git.kernel.org/stable/c/2474eb7fc3bfbce10f7b8ea431fcffe5dd5f5100"
        },
        {
          "url": "https://git.kernel.org/stable/c/065334f6640d074a1caec2f8b0091467a22f9483"
        },
        {
          "url": "https://git.kernel.org/stable/c/9eff2b2e59fda25051ab36cd1cb5014661df657b"
        }
      ],
      "title": "usb: host: ohci-tmio: check return value after calling platform_get_resource()",
      "x_generator": {
        "engine": "bippy-1.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
    "assignerShortName": "Linux",
    "cveId": "CVE-2021-47206",
    "datePublished": "2024-04-10T18:56:38.995Z",
    "dateReserved": "2024-03-25T09:12:14.118Z",
    "dateUpdated": "2025-05-04T07:06:23.050Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2021-47206\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2024-04-10T19:15:48.357\",\"lastModified\":\"2025-01-07T17:12:26.390\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nusb: host: ohci-tmio: check return value after calling platform_get_resource()\\n\\nIt will cause null-ptr-deref if platform_get_resource() returns NULL,\\nwe need check the return value.\"},{\"lang\":\"es\",\"value\":\"En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: usb: host: ohci-tmio: verificar el valor de retorno despu\u00e9s de llamar a platform_get_resource() Causar\u00e1 null-ptr-deref si platform_get_resource() devuelve NULL, necesitamos verificar el valor de retorno.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":5.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-476\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"4.4.293\",\"matchCriteriaId\":\"83024F84-4857-4CAF-957E-C14804BAC4AF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.5\",\"versionEndExcluding\":\"4.9.291\",\"matchCriteriaId\":\"8B1EE39E-FE30-4B7D-A26F-631135BCBB3F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.10\",\"versionEndExcluding\":\"4.14.256\",\"matchCriteriaId\":\"FCEB92FF-21BF-4F75-ACA1-6AE1D51A79FC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.15\",\"versionEndExcluding\":\"4.19.218\",\"matchCriteriaId\":\"4F85F433-5DEA-47D3-B07E-3B1AC474D6E0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.20\",\"versionEndExcluding\":\"5.4.162\",\"matchCriteriaId\":\"51A152D8-D5CE-47BD-9041-DEE164DCE99D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.5\",\"versionEndExcluding\":\"5.10.82\",\"matchCriteriaId\":\"AE501832-500C-4EF1-9489-5C13674F619D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.11\",\"versionEndExcluding\":\"5.15.5\",\"matchCriteriaId\":\"2128A085-4C0C-4C1E-9E9C-0DD868E2170F\"}]}]}],\"references\":[{\"url\":\"https://git.kernel.org/stable/c/065334f6640d074a1caec2f8b0091467a22f9483\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/2474eb7fc3bfbce10f7b8ea431fcffe5dd5f5100\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/28e016e02118917e50a667bc72fb80098cf2b460\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/2f18f97a1a787154a372c0738f1576f14b693d91\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/951b8239fd24678b56c995c5c0456ab12e059d19\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/9eff2b2e59fda25051ab36cd1cb5014661df657b\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/bb6ed2e05eb6e8619b30fa854f9becd50c11723f\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/f98986b7acb4219f95789095eced93ed69d81d35\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/065334f6640d074a1caec2f8b0091467a22f9483\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/2474eb7fc3bfbce10f7b8ea431fcffe5dd5f5100\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/28e016e02118917e50a667bc72fb80098cf2b460\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/2f18f97a1a787154a372c0738f1576f14b693d91\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/951b8239fd24678b56c995c5c0456ab12e059d19\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/9eff2b2e59fda25051ab36cd1cb5014661df657b\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/bb6ed2e05eb6e8619b30fa854f9becd50c11723f\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/f98986b7acb4219f95789095eced93ed69d81d35\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]}]}}",
    "vulnrichment": {
      "containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://git.kernel.org/stable/c/28e016e02118917e50a667bc72fb80098cf2b460\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/2f18f97a1a787154a372c0738f1576f14b693d91\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/bb6ed2e05eb6e8619b30fa854f9becd50c11723f\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/951b8239fd24678b56c995c5c0456ab12e059d19\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/f98986b7acb4219f95789095eced93ed69d81d35\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/2474eb7fc3bfbce10f7b8ea431fcffe5dd5f5100\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/065334f6640d074a1caec2f8b0091467a22f9483\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/9eff2b2e59fda25051ab36cd1cb5014661df657b\", \"tags\": [\"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-04T05:32:07.335Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2021-47206\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-06-21T16:04:28.537422Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-06-21T16:04:33.106Z\"}}], \"cna\": {\"title\": \"usb: host: ohci-tmio: check return value after calling platform_get_resource()\", \"affected\": [{\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"affected\", \"version\": \"1da177e4c3f41524e886b7f1b8a0c1fc7321cac2\", \"lessThan\": \"28e016e02118917e50a667bc72fb80098cf2b460\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"1da177e4c3f41524e886b7f1b8a0c1fc7321cac2\", \"lessThan\": \"2f18f97a1a787154a372c0738f1576f14b693d91\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"1da177e4c3f41524e886b7f1b8a0c1fc7321cac2\", \"lessThan\": \"bb6ed2e05eb6e8619b30fa854f9becd50c11723f\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"1da177e4c3f41524e886b7f1b8a0c1fc7321cac2\", \"lessThan\": \"951b8239fd24678b56c995c5c0456ab12e059d19\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"1da177e4c3f41524e886b7f1b8a0c1fc7321cac2\", \"lessThan\": \"f98986b7acb4219f95789095eced93ed69d81d35\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"1da177e4c3f41524e886b7f1b8a0c1fc7321cac2\", \"lessThan\": \"2474eb7fc3bfbce10f7b8ea431fcffe5dd5f5100\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"1da177e4c3f41524e886b7f1b8a0c1fc7321cac2\", \"lessThan\": \"065334f6640d074a1caec2f8b0091467a22f9483\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"1da177e4c3f41524e886b7f1b8a0c1fc7321cac2\", \"lessThan\": \"9eff2b2e59fda25051ab36cd1cb5014661df657b\", \"versionType\": \"git\"}], \"programFiles\": [\"drivers/usb/host/ohci-tmio.c\"], \"defaultStatus\": \"unaffected\"}, {\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"4.4.293\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"4.4.*\"}, {\"status\": \"unaffected\", \"version\": \"4.9.291\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"4.9.*\"}, {\"status\": \"unaffected\", \"version\": \"4.14.256\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"4.14.*\"}, {\"status\": \"unaffected\", \"version\": \"4.19.218\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"4.19.*\"}, {\"status\": \"unaffected\", \"version\": \"5.4.162\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"5.4.*\"}, {\"status\": \"unaffected\", \"version\": \"5.10.82\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"5.10.*\"}, {\"status\": \"unaffected\", \"version\": \"5.15.5\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"5.15.*\"}, {\"status\": \"unaffected\", \"version\": \"5.16\", \"versionType\": \"original_commit_for_fix\", \"lessThanOrEqual\": \"*\"}], \"programFiles\": [\"drivers/usb/host/ohci-tmio.c\"], \"defaultStatus\": \"affected\"}], \"references\": [{\"url\": \"https://git.kernel.org/stable/c/28e016e02118917e50a667bc72fb80098cf2b460\"}, {\"url\": \"https://git.kernel.org/stable/c/2f18f97a1a787154a372c0738f1576f14b693d91\"}, {\"url\": \"https://git.kernel.org/stable/c/bb6ed2e05eb6e8619b30fa854f9becd50c11723f\"}, {\"url\": \"https://git.kernel.org/stable/c/951b8239fd24678b56c995c5c0456ab12e059d19\"}, {\"url\": \"https://git.kernel.org/stable/c/f98986b7acb4219f95789095eced93ed69d81d35\"}, {\"url\": \"https://git.kernel.org/stable/c/2474eb7fc3bfbce10f7b8ea431fcffe5dd5f5100\"}, {\"url\": \"https://git.kernel.org/stable/c/065334f6640d074a1caec2f8b0091467a22f9483\"}, {\"url\": \"https://git.kernel.org/stable/c/9eff2b2e59fda25051ab36cd1cb5014661df657b\"}], \"x_generator\": {\"engine\": \"bippy-1.2.0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"In the Linux kernel, the following vulnerability has been resolved:\\n\\nusb: host: ohci-tmio: check return value after calling platform_get_resource()\\n\\nIt will cause null-ptr-deref if platform_get_resource() returns NULL,\\nwe need check the return value.\"}], \"cpeApplicability\": [{\"nodes\": [{\"negate\": false, \"cpeMatch\": [{\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"4.4.293\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"4.9.291\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"4.14.256\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"4.19.218\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"5.4.162\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"5.10.82\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"5.15.5\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"5.16\"}], \"operator\": \"OR\"}]}], \"providerMetadata\": {\"orgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"shortName\": \"Linux\", \"dateUpdated\": \"2025-05-04T07:06:23.050Z\"}}}",
      "cveMetadata": "{\"cveId\": \"CVE-2021-47206\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-05-04T07:06:23.050Z\", \"dateReserved\": \"2024-03-25T09:12:14.118Z\", \"assignerOrgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"datePublished\": \"2024-04-10T18:56:38.995Z\", \"assignerShortName\": \"Linux\"}",
      "dataType": "CVE_RECORD",
      "dataVersion": "5.1"
    }
  }
}
  suse-su-2024:1663-1
Vulnerability from csaf_suse
Published
2024-05-15 19:08
    Modified
2024-05-15 19:08
    Summary
Security update for the Linux Kernel
    Notes
Title of the patch
Security update for the Linux Kernel
    Description of the patch
The SUSE Linux Enterprise 15 SP5 Real Time kernel was updated to receive various security bugfixes.
The following security bugs were fixed:
- CVE-2024-27389: Fixed pstore inode handling with d_invalidate() (bsc#1223705).
- CVE-2024-27062: Fixed nouveau lock inside client object tree (bsc#1223834).
- CVE-2024-27056: Fixed wifi/iwlwifi/mvm to ensure offloading TID queue exists (bsc#1223822).
- CVE-2024-27046: Fixed nfp/flower handling acti_netdevs allocation failure (bsc#1223827).
- CVE-2024-27043: Fixed a use-after-free in edia/dvbdev in different places (bsc#1223824).
- CVE-2024-27041: Fixed drm/amd/display NULL checks for adev->dm.dc in amdgpu_dm_fini() (bsc#1223714).
- CVE-2024-27039: Fixed clk/hisilicon/hi3559a an erroneous devm_kfree() (bsc#1223821).
- CVE-2024-27038: Fixed clk_core_get NULL pointer dereference (bsc#1223816).
- CVE-2024-27030: Fixed octeontx2-af to use separate handlers for interrupts (bsc#1223790).
- CVE-2024-27014: Fixed net/mlx5e to prevent deadlock while disabling aRFS (bsc#1223735).
- CVE-2024-27013: Fixed tun limit printing rate when illegal packet received by tun device (bsc#1223745).
- CVE-2024-26993: Fixed fs/sysfs reference leak in sysfs_break_active_protection() (bsc#1223693).
- CVE-2024-26982: Fixed Squashfs inode number check not to be an invalid value of zero (bsc#1223634).
- CVE-2024-26970: Fixed clk/qcom/gcc-ipq6018 termination of frequency table arrays (bsc#1223644).
- CVE-2024-26969: Fixed clk/qcom/gcc-ipq8074 termination of frequency table arrays (bsc#1223645).
- CVE-2024-26966: Fixed clk/qcom/mmcc-apq8084 termination of frequency table arrays (bsc#1223646).
- CVE-2024-26965: Fixed clk/qcom/mmcc-msm8974 termination of frequency table arrays (bsc#1223648).
- CVE-2024-26960: Fixed mm/swap race between free_swap_and_cache() and swapoff() (bsc#1223655).
- CVE-2024-26951: Fixed wireguard/netlink check for dangling peer via is_dead instead of empty list (bsc#1223660).
- CVE-2024-26950: Fixed wireguard/netlink to access device through ctx instead of peer (bsc#1223661).
- CVE-2024-26948: Fixed drm/amd/display by adding dc_state NULL check in dc_state_release (bsc#1223664).
- CVE-2024-26927: Fixed ASoC/SOF bounds checking to firmware data Smatch (bsc#1223525).
- CVE-2024-26901: Fixed do_sys_name_to_handle() to use kzalloc() to prevent kernel-infoleak (bsc#1223198).
- CVE-2024-26896: Fixed wifi/wfx memory leak when starting AP (bsc#1223042).
- CVE-2024-26893: Fixed firmware/arm_scmi for possible double free in SMC transport cleanup path (bsc#1223196).
- CVE-2024-26885: Fixed bpf DEVMAP_HASH overflow check on 32-bit arches (bsc#1223190).
- CVE-2024-26884: Fixed bpf hashtab overflow check on 32-bit arches (bsc#1223189).
- CVE-2024-26883: Fixed bpf stackmap overflow check on 32-bit arches (bsc#1223035).
- CVE-2024-26882: Fixed net/ip_tunnel to make sure to pull inner header in ip_tunnel_rcv() (bsc#1223034).
- CVE-2024-26881: Fixed net/hns3 kernel crash when 1588 is received on HIP08 devices (bsc#1223041).
- CVE-2024-26879: Fixed clk/meson by adding missing clocks to axg_clk_regmaps (bsc#1223066).
- CVE-2024-26878: Fixed quota for potential NULL pointer dereference (bsc#1223060).
- CVE-2024-26866: Fixed spi/spi-fsl-lpspi by removing redundant spi_controller_put call (bsc#1223024).
- CVE-2024-26862: Fixed packet annotate data-races around ignore_outgoing (bsc#1223111).
- CVE-2024-26861: Fixed wireguard/receive annotate data-race around receiving_counter.counter (bsc#1223076).
- CVE-2024-26857: Fixed geneve to make sure to pull inner header in geneve_rx() (bsc#1223058).
- CVE-2024-26856: Fixed use-after-free inside sparx5_del_mact_entry (bsc#1223052).
- CVE-2024-26855: Fixed net/ice potential NULL pointer dereference in ice_bridge_setlink() (bsc#1223051).
- CVE-2024-26853: Fixed igc returning frame twice in XDP_REDIRECT (bsc#1223061).
- CVE-2024-26852: Fixed net/ipv6 to avoid possible UAF in ip6_route_mpath_notify() (bsc#1223057).
- CVE-2024-26848: Fixed afs endless loop in directory parsing (bsc#1223030).
- CVE-2024-26836: Fixed platform/x86/think-lmi password opcode ordering for workstations (bsc#1222968).
- CVE-2024-26830: Fixed i40e to not allow untrusted VF to remove administratively set MAC (bsc#1223012).
- CVE-2024-26817: Fixed amdkfd to use calloc instead of kzalloc to avoid integer overflow (bsc#1222812).
- CVE-2024-26816: Fixed relocations in .notes section when building with CONFIG_XEN_PV=y by ignoring them (bsc#1222624).
- CVE-2024-26807: Fixed spi/cadence-qspi NULL pointer reference in runtime PM hooks (bsc#1222801).
- CVE-2024-26805: Fixed a kernel-infoleak-after-free in __skb_datagram_iter in netlink  (bsc#1222630).
- CVE-2024-26793: Fixed an use-after-free and null-ptr-deref in gtp_newlink() in gtp  (bsc#1222428).
- CVE-2024-26783: Fixed mm/vmscan bug when calling wakeup_kswapd() with a wrong zone index (bsc#1222615).
- CVE-2024-26779: Fixed a race condition on enabling fast-xmit in mac80211 (bsc#1222772).
- CVE-2024-26773: Fixed ext4 block allocation from corrupted group in ext4_mb_try_best_found() (bsc#1222618).
- CVE-2024-26772: Fixed ext4 to avoid allocating blocks from corrupted group in ext4_mb_find_by_goal() (bsc#1222613).
- CVE-2024-26771: Fixed a null pointer dereference on edma_probe in dmaengine ti edma  (bsc#1222610)
- CVE-2024-26766: Fixed SDMA off-by-one error in _pad_sdma_tx_descs() (bsc#1222726).
- CVE-2024-26764: Fixed IOCB_AIO_RW check in fs/aio before the struct aio_kiocb conversion (bsc#1222721).
- CVE-2024-26763: Fixed user corruption via by writing data with O_DIRECT on device in dm-crypt (bsc#1222720).
- CVE-2024-26760: Fixed scsi/target/pscsi bio_put() for error case (bsc#1222596).
- CVE-2024-267600: Fixed scsi/target/pscsi error case in bio_put() (bsc#1222596).
- CVE-2024-26754: Fixed an use-after-free and null-ptr-deref in gtp_genl_dump_pdp() in gtp  (bsc#1222632).
- CVE-2024-26751: Fixed ARM/ep93xx terminator to gpiod_lookup_table (bsc#1222724).
- CVE-2024-26747: Fixed a NULL pointer issue with USB parent module's reference (bsc#1222609).
- CVE-2024-26744: Fixed null pointer dereference in srpt_service_guid parameter in rdma/srpt (bsc#1222449).
- CVE-2024-26743: Fixed memory leak in qedr_create_user_qp error flow in rdma/qedr (bsc#1222677).
- CVE-2024-26737: Fixed selftests/bpf racing between bpf_timer_cancel_and_free and bpf_timer_cancel (bsc#1222557).
- CVE-2024-26733: Fixed an overflow in arp_req_get() in arp (bsc#1222585).
- CVE-2024-26727: Fixed assertion if a newly created btrfs subvolume already gets read (bsc#1222536).
- CVE-2024-26718: Fixed dm-crypt/dm-verity disable tasklets (bsc#1222416).
- CVE-2024-26704: Fixed a double-free of blocks due to wrong extents moved_len in ext4 (bsc#1222422).
- CVE-2024-26696: Fixed nilfs2 hang in nilfs_lookup_dirty_data_buffers() (bsc#1222549).
- CVE-2024-26689: Fixed a use-after-free in encode_cap_msg() (bsc#1222503).
- CVE-2024-26687: Fixed xen/events close evtchn after mapping cleanup (bsc#1222435).
- CVE-2024-26685: Fixed nilfs2 potential bug in end_buffer_async_write (bsc#1222437).
- CVE-2024-26684: Fixed net/stmmac/xgmac handling of DPP safety error for DMA channels (bsc#1222445).
- CVE-2024-26681: Fixed netdevsim to avoid potential loop in nsim_dev_trap_report_work() (bsc#1222431).
- CVE-2024-26680: Fixed net/atlantic DMA mapping for PTP hwts ring (bsc#1222427).
- CVE-2024-26675: Fixed ppp_async to limit MRU to 64K (bsc#1222379).
- CVE-2024-26673: Fixed netfilter/nft_ct layer 3 and 4 protocol sanitization (bsc#1222368).
- CVE-2024-26671: Fixed blk-mq IO hang from sbitmap wakeup race (bsc#1222357).
- CVE-2024-26660: Fixed drm/amd/display bounds check for stream encoder creation (bsc#1222266).
- CVE-2024-26656: Fixed drm/amdgpu use-after-free bug (bsc#1222307).
- CVE-2024-26610: Fixed memory corruption in wifi/iwlwifi (bsc#1221299).
- CVE-2024-26601: Fixed ext4 buddy bitmap corruption via fast commit replay (bsc#1220342).
- CVE-2024-23850: Fixed double free of anonymous device after snapshot  creation failure (bsc#1219126).
- CVE-2024-23848: Fixed media/cec for possible use-after-free in cec_queue_msg_fh (bsc#1219104).
- CVE-2024-23307: Fixed Integer Overflow or Wraparound vulnerability in x86 and ARM md, raid, raid5 modules (bsc#1219169).
- CVE-2024-22099: Fixed a null-pointer-dereference in rfcomm_check_security (bsc#1219170).
- CVE-2024-0841: Fixed a null pointer dereference in the hugetlbfs_fill_super function in hugetlbfs (HugeTLB pages) functionality (bsc#1219264).
- CVE-2024-0639: Fixed a denial-of-service vulnerability due to a deadlock found in sctp_auto_asconf_init in net/sctp/socket.c (bsc#1218917).
- CVE-2023-6270: Fixed a use-after-free issue in aoecmd_cfg_pkts (bsc#1218562).
- CVE-2023-52652: Fixed NTB for possible name leak in ntb_register_device() (bsc#1223686).
- CVE-2023-52645: Fixed pmdomain/mediatek race conditions with genpd (bsc#1223033).
- CVE-2023-52636: Fixed libceph cursor init when preparing sparse read in msgr2 (bsc#1222247).
- CVE-2023-52635: Fixed PM/devfreq to synchronize devfreq_monitor_[start/stop] (bsc#1222294).
- CVE-2023-52627: Fixed iio:adc:ad7091r exports into IIO_AD7091R namespace (bsc#1222051).
- CVE-2023-52620: Fixed netfilter/nf_tables to disallow timeout for anonymous sets never used from userspace (bsc#1221825).
- CVE-2023-52616: Fixed unexpected pointer access in crypto/lib/mpi in mpi_ec_init (bsc#1221612).
- CVE-2023-52614: Fixed PM/devfreq buffer overflow in trans_stat_show (bsc#1221617).
- CVE-2023-52593: Fixed wifi/wfx possible NULL pointer dereference in wfx_set_mfp_ap() (bsc#1221042).
- CVE-2023-52591: Fixed a possible reiserfs filesystem corruption via directory renaming (bsc#1221044).
- CVE-2023-52590: Fixed a possible ocfs2 filesystem corruption via directory renaming (bsc#1221088).
- CVE-2023-52589: Fixed media/rkisp1 IRQ disable race issue (bsc#1221084).
- CVE-2023-52585: Fixed drm/amdgpu for possible NULL pointer dereference in amdgpu_ras_query_error_status_helper() (bsc#1221080).
- CVE-2023-52561: Fixed arm64/dts/qcom/sdm845-db845c to mark cont splash memory region (bsc#1220935).
- CVE-2023-52503: Fixed tee/amdtee use-after-free vulnerability in amdtee_close_session (bsc#1220915).
- CVE-2023-52488: Fixed serial/sc16is7xx convert from _raw_ to _noinc_ regmap functions for FIFO (bsc#1221162).
- CVE-2022-48701: Fixed an out-of-bounds bug in __snd_usb_parse_audio_interface() (bsc#1223921).
- CVE-2022-48662: Fixed a general protection fault (GPF) in i915_perf_open_ioctl (bsc#1223505).
- CVE-2022-48659: Fixed mm/slub to return errno if kmalloc() fails (bsc#1223498).
- CVE-2022-48658: Fixed mm/slub to avoid a problem in flush_cpu_slab()/__free_slab() task context (bsc#1223496).
- CVE-2022-48651: Fixed an out-of-bound bug in ipvlan caused by unset skb->mac_header (bsc#1223513).
- CVE-2022-48642: Fixed netfilter/nf_tables percpu memory leak at nf_tables_addchain() (bsc#1223478).
- CVE-2022-48640: Fixed bonding for possible NULL pointer dereference in bond_rr_gen_slave_id (bsc#1223499).
- CVE-2022-48631: Fixed a bug in ext4, when parsing extents where eh_entries == 0 and eh_depth > 0 (bsc#1223475).
- CVE-2021-47214: Fixed hugetlb/userfaultfd during restore reservation in hugetlb_mcopy_atomic_pte() (bsc#1222710).
- CVE-2021-47211: Fixed a null pointer dereference on pointer cs_desc in usb-audio (bsc#1222869).
- CVE-2021-47207: Fixed a null pointer dereference on pointer block in gus (bsc#1222790).
- CVE-2021-47205: Unregistered clocks/resets when unbinding in sunxi-ng (bsc#1222888).
- CVE-2021-47202: Fixed NULL pointer dereferences in of_thermal_ functions (bsc#1222878)
- CVE-2021-47200: Fixed drm/prime for possible use-after-free in mmap within drm_gem_ttm_mmap() and drm_gem_ttm_mmap() (bsc#1222838).
- CVE-2021-47195: Fixed use-after-free inside SPI via add_lock mutex (bsc#1222832).
- CVE-2021-47189: Fixed denial of service due to memory ordering issues between normal and ordered work functions in btrfs (bsc#1222706).
- CVE-2021-47185: Fixed a softlockup issue in flush_to_ldisc in tty tty_buffer (bsc#1222669).
- CVE-2021-47184: Fixed NULL pointer dereference on VSI filter sync (bsc#1222666).
- CVE-2021-47183: Fixed a null pointer dereference during link down processing in scsi lpfc (bsc#1192145, bsc#1222664).
- CVE-2021-47182: Fixed scsi_mode_sense() buffer length handling (bsc#1222662).
- CVE-2021-47181: Fixed a null pointer dereference caused by calling platform_get_resource()  (bsc#1222660).
The following non-security bugs were fixed:
- ALSA: firewire-lib: handle quirk to calculate payload quadlets as data block counter (stable-fixes).
- ALSA: hda/realtek - Enable audio jacks of Haier Boyue G42 with ALC269VC (stable-fixes).
- ALSA: hda/realtek - Fix inactive headset mic jack (stable-fixes).
- ALSA: hda/realtek: Add quirk for HP SnowWhite laptops (stable-fixes).
- ALSA: hda/realtek: Fix mute led of HP Laptop 15-da3001TU (stable-fixes).
- ALSA: hda: intel-sdw-acpi: fix usage of device_get_named_child_node() (git-fixes).
- ALSA: scarlett2: Add Focusrite Clarett 2Pre and 4Pre USB support (stable-fixes).
- ALSA: scarlett2: Add Focusrite Clarett+ 2Pre and 4Pre support (stable-fixes).
- ALSA: scarlett2: Add correct product series name to messages (stable-fixes).
- ALSA: scarlett2: Add support for Clarett 8Pre USB (stable-fixes).
- ALSA: scarlett2: Default mixer driver to enabled (stable-fixes).
- ALSA: scarlett2: Move USB IDs out from device_info struct (stable-fixes).
- ASoC: meson: axg-card: make links nonatomic (git-fixes).
- ASoC: meson: axg-tdm-interface: manage formatters in trigger (git-fixes).
- ASoC: meson: cards: select SND_DYNAMIC_MINORS (git-fixes).
- ASoC: soc-core.c: Skip dummy codec when adding platforms (stable-fixes).
- ASoC: tegra: Fix DSPK 16-bit playback (git-fixes).
- ASoC: ti: davinci-mcasp: Fix race condition during probe (git-fixes).
- Bluetooth: Add new quirk for broken read key length on ATS2851 (git-fixes).
- Bluetooth: Fix TOCTOU in HCI debugfs implementation (git-fixes).
- Bluetooth: Fix memory leak in hci_req_sync_complete() (git-fixes).
- Bluetooth: Fix type of len in {l2cap,sco}_sock_getsockopt_old() (stable-fixes).
- Bluetooth: L2CAP: Fix not validating setsockopt user input (git-fixes).
- Bluetooth: RFCOMM: Fix not validating setsockopt user input (git-fixes).
- Bluetooth: SCO: Fix not validating setsockopt user input (git-fixes).
- Bluetooth: add quirk for broken address properties (git-fixes).
- Bluetooth: btintel: Fix null ptr deref in btintel_read_version (stable-fixes).
- Bluetooth: btintel: Fixe build regression (git-fixes).
- Bluetooth: btusb: Add Realtek RTL8852BE support ID 0x0bda:0x4853 (stable-fixes).
- Bluetooth: hci_event: Fix sending HCI_OP_READ_ENC_KEY_SIZE (git-fixes).
- Bluetooth: hci_event: set the conn encrypted before conn establishes (stable-fixes).
- Bluetooth: hci_sock: Fix not validating setsockopt user input (git-fixes).
- Bluetooth: qca: fix NULL-deref on non-serdev suspend (git-fixes).
- Documentation: Add missing documentation for EXPORT_OP flags (stable-fixes).
- HID: intel-ish-hid: ipc: Fix dev_err usage with uninitialized dev->devc (git-fixes).
- HID: logitech-dj: allow mice to use all types of reports (git-fixes).
- HID: uhid: Use READ_ONCE()/WRITE_ONCE() for ->running (stable-fixes).
- Input: allocate keycode for Display refresh rate toggle (stable-fixes).
- Input: synaptics-rmi4 - fail probing if memory allocation for 'phys' fails (stable-fixes).
- NFC: trf7970a: disable all regulators on removal (git-fixes).
- NFS: avoid spurious warning of lost lock that is being unlocked (bsc#1221791).
- PCI/AER: Block runtime suspend when handling errors (git-fixes).
- PCI/DPC: Quirk PIO log size for Intel Ice Lake Root Ports (git-fixes).
- PCI/DPC: Quirk PIO log size for Intel Raptor Lake Root Ports (git-fixes).
- PCI/DPC: Quirk PIO log size for certain Intel Root Ports (git-fixes).
- PCI/PM: Drain runtime-idle callbacks before driver removal (git-fixes).
- PCI: Drop pci_device_remove() test of pci_dev->driver (git-fixes).
- PCI: rpaphp: Error out on busy status from get-sensor-state (bsc#1223369 ltc#205888).
- RAS: Avoid build errors when CONFIG_DEBUG_FS=n (jsc#PED-7619).
- RDMA/cm: Print the old state when cm_destroy_id gets timeout (git-fixes).
- RDMA/cm: add timeout to cm_destroy_id wait (git-fixes)
- README.BRANCH: Correct email address for Petr Tesarik
- README.BRANCH: Remove copy of branch name
- Reapply 'drm/qxl: simplify qxl_fence_wait' (stable-fixes).
- Revert 'ACPI: PM: Block ASUS B1400CEAE from suspend to idle by default' (stable-fixes).
- Revert 'drm/qxl: simplify qxl_fence_wait' (git-fixes).
- Revert 'ice: Fix ice VF reset during iavf initialization (jsc#PED-376).' (bsc#1223275)
- Revert 'usb: cdc-wdm: close race between read and workqueue' (git-fixes).
- Revert 'usb: phy: generic: Get the vbus supply' (git-fixes).
- USB: UAS: return ENODEV when submit urbs fail with device not attached (stable-fixes).
- USB: serial: add device ID for VeriFone adapter (stable-fixes).
- USB: serial: cp210x: add ID for MGP Instruments PDS100 (stable-fixes).
- USB: serial: cp210x: add pid/vid for TDK NC0110013M and MM0110113M (stable-fixes).
- USB: serial: ftdi_sio: add support for GMC Z216C Adapter IR-USB (stable-fixes).
- USB: serial: option: add Fibocom FM135-GL variants (stable-fixes).
- USB: serial: option: add Lonsung U8300/U9300 product (stable-fixes).
- USB: serial: option: add MeiG Smart SLM320 product (stable-fixes).
- USB: serial: option: add Rolling RW101-GL and RW135-GL support (stable-fixes).
- USB: serial: option: add Telit FN920C04 rmnet compositions (stable-fixes).
- USB: serial: option: add support for Fibocom FM650/FG650 (stable-fixes).
- USB: serial: option: support Quectel EM060K sub-models (stable-fixes).
- ahci: asm1064: asm1166: do not limit reported ports (git-fixes).
- ahci: asm1064: correct count of reported ports (stable-fixes).
- arm64: dts: imx8-ss-conn: fix usdhc wrong lpcg clock order (git-fixes)
- arm64: dts: rockchip: Remove unsupported node from the Pinebook Pro (git-fixes)
- arm64: dts: rockchip: enable internal pull-up for Q7_THRM# on RK3399 (git-fixes)
- arm64: dts: rockchip: enable internal pull-up on PCIE_WAKE# for (git-fixes)
- arm64: dts: rockchip: enable internal pull-up on Q7_USB_ID for RK3399 (git-fixes)
- arm64: dts: rockchip: fix rk3328 hdmi ports node (git-fixes)
- arm64: dts: rockchip: fix rk3399 hdmi ports node (git-fixes)
- arm64: hibernate: Fix level3 translation fault in swsusp_save() (git-fixes).
- ax25: fix use-after-free bugs caused by ax25_ds_del_timer (git-fixes).
- batman-adv: Avoid infinite loop trying to resize local TT (git-fixes).
- bcache: Fix __bch_btree_node_alloc to make the failure behavior consistent (git-fixes).
- bcache: Remove dead references to cache_readaheads (git-fixes).
- bcache: Remove unnecessary NULL point check in node allocations (git-fixes).
- bcache: add code comments for bch_btree_node_get() and __bch_btree_node_alloc() (git-fixes).
- bcache: avoid NULL checking to c->root in run_cache_set() (git-fixes).
- bcache: avoid oversize memory allocation by small stripe_size (git-fixes).
- bcache: bset: Fix comment typos (git-fixes).
- bcache: check return value from btree_node_alloc_replacement() (git-fixes).
- bcache: fix NULL pointer reference in cached_dev_detach_finish (git-fixes).
- bcache: fix error info in register_bcache() (git-fixes).
- bcache: fixup bcache_dev_sectors_dirty_add() multithreaded CPU false sharing (git-fixes).
- bcache: fixup btree_cache_wait list damage (git-fixes).
- bcache: fixup init dirty data errors (git-fixes).
- bcache: fixup lock c->root error (git-fixes).
- bcache: fixup multi-threaded bch_sectors_dirty_init() wake-up race (git-fixes).
- bcache: move calc_cached_dev_sectors to proper place on backing device detach (git-fixes).
- bcache: move uapi header bcache.h to bcache code directory (git-fixes).
- bcache: prevent potential division by zero error (git-fixes).
- bcache: remove EXPERIMENTAL for Kconfig option 'Asynchronous device registration' (git-fixes).
- bcache: remove redundant assignment to variable cur_idx (git-fixes).
- bcache: remove the backing_dev_name field from struct cached_dev (git-fixes).
- bcache: remove the cache_dev_name field from struct cache (git-fixes).
- bcache: remove unnecessary flush_workqueue (git-fixes).
- bcache: remove unused bch_mark_cache_readahead function def in stats.h (git-fixes).
- bcache: replace a mistaken IS_ERR() by IS_ERR_OR_NULL() in btree_gc_coalesce() (git-fixes).
- bcache: replace snprintf in show functions with sysfs_emit (git-fixes).
- bcache: revert replacing IS_ERR_OR_NULL with IS_ERR (git-fixes).
- bcache: use bvec_kmap_local in bch_data_verify (git-fixes).
- bcache: use bvec_kmap_local in bio_csum (git-fixes).
- bcache: use default_groups in kobj_type (git-fixes).
- bcache:: fix repeated words in comments (git-fixes).
- ceph: stop copying to iter at EOF on sync reads (bsc#1223068).
- ceph: switch to corrected encoding of max_xattr_size in mdsmap (bsc#1223067).
- clk: Get runtime PM before walking tree during disable_unused (git-fixes).
- clk: Initialize struct clk_core kref earlier (stable-fixes).
- clk: Mark 'all_lists' as const (stable-fixes).
- clk: Print an info line before disabling unused clocks (stable-fixes).
- clk: Remove prepare_lock hold assertion in __clk_release() (git-fixes).
- clk: remove extra empty line (stable-fixes).
- comedi: vmk80xx: fix incomplete endpoint checking (git-fixes).
- dm cache policy smq: ensure IO does not prevent cleaner policy progress (git-fixes).
- dm cache: add cond_resched() to various workqueue loops (git-fixes).
- dm clone: call kmem_cache_destroy() in dm_clone_init() error path (git-fixes).
- dm crypt: add cond_resched() to dmcrypt_write() (git-fixes).
- dm crypt: avoid accessing uninitialized tasklet (git-fixes).
- dm flakey: do not corrupt the zero page (git-fixes).
- dm flakey: fix a bug with 32-bit highmem systems (git-fixes).
- dm flakey: fix a crash with invalid table line (git-fixes).
- dm flakey: fix logic when corrupting a bio (git-fixes).
- dm init: add dm-mod.waitfor to wait for asynchronously probed block devices (git-fixes).
- dm integrity: call kmem_cache_destroy() in dm_integrity_init() error path (git-fixes).
- dm integrity: fix out-of-range warning (git-fixes).
- dm integrity: reduce vmalloc space footprint on 32-bit architectures (git-fixes).
- dm raid: clean up four equivalent goto tags in raid_ctr() (git-fixes).
- dm raid: fix false positive for requeue needed during reshape (git-fixes).
- dm raid: fix missing reconfig_mutex unlock in raid_ctr() error paths (git-fixes).
- dm stats: check for and propagate alloc_percpu failure (git-fixes).
- dm thin metadata: Fix ABBA deadlock by resetting dm_bufio_client (git-fixes).
- dm thin metadata: check fail_io before using data_sm (git-fixes).
- dm thin: add cond_resched() to various workqueue loops (git-fixes).
- dm thin: fix deadlock when swapping to thin device (bsc#1177529).
- dm verity: do not perform FEC for failed readahead IO (git-fixes).
- dm verity: fix error handling for check_at_most_once on FEC (git-fixes).
- dm zoned: free dmz->ddev array in dmz_put_zoned_devices (git-fixes).
- dm-delay: fix a race between delay_presuspend and delay_bio (git-fixes).
- dm-integrity: do not modify bio's immutable bio_vec in integrity_metadata() (git-fixes).
- dm-raid: fix lockdep waring in 'pers->hot_add_disk' (git-fixes).
- dm-verity, dm-crypt: align 'struct bvec_iter' correctly (git-fixes).
- dm-verity: align struct dm_verity_fec_io properly (git-fixes).
- dm: add cond_resched() to dm_wq_work() (git-fixes).
- dm: call the resume method on internal suspend (git-fixes).
- dm: do not lock fs when the map is NULL during suspend or resume (git-fixes).
- dm: do not lock fs when the map is NULL in process of resume (git-fixes).
- dm: remove flush_scheduled_work() during local_exit() (git-fixes).
- dm: send just one event on resize, not two (git-fixes).
- dma: xilinx_dpdma: Fix locking (git-fixes).
- dmaengine: idxd: Fix oops during rmmod on single-CPU platforms (git-fixes).
- dmaengine: owl: fix register access functions (git-fixes).
- dmaengine: tegra186: Fix residual calculation (git-fixes).
- docs: Document the FAN_FS_ERROR event (stable-fixes).
- drm-print: add drm_dbg_driver to improve namespace symmetry (stable-fixes).
- drm/amd/display: Do not recursively call manual trigger programming (stable-fixes).
- drm/amd/display: Fix nanosec stat overflow (stable-fixes).
- drm/amd/display: fix disable otg wa logic in DCN316 (stable-fixes).
- drm/amd/pm: fixes a random hang in S4 for SMU v13.0.4/11 (stable-fixes).
- drm/amdgpu/sdma5.2: use legacy HDP flush for SDMA2/3 (stable-fixes).
- drm/amdgpu: Fix leak when GPU memory allocation fails (stable-fixes).
- drm/amdgpu: Reset dGPU if suspend got aborted (stable-fixes).
- drm/amdgpu: always force full reset for SOC21 (stable-fixes).
- drm/amdgpu: fix incorrect active rb bitmap for gfx11 (stable-fixes).
- drm/amdgpu: fix incorrect number of active RBs for gfx11 (stable-fixes).
- drm/amdgpu: once more fix the call oder in amdgpu_ttm_move() v2 (git-fixes).
- drm/amdgpu: validate the parameters of bo mapping operations more clearly (git-fixes).
- drm/amdkfd: Reset GPU on queue preemption failure (stable-fixes).
- drm/ast: Fix soft lockup (git-fixes).
- drm/client: Fully protect modes[] with dev->mode_config.mutex (stable-fixes).
- drm/i915/cdclk: Fix CDCLK programming order when pipes are active (git-fixes).
- drm/i915/vrr: Disable VRR when using bigjoiner (stable-fixes).
- drm/i915: Disable port sync when bigjoiner is used (stable-fixes).
- drm/msm/dp: fix typo in dp_display_handle_port_status_changed() (git-fixes).
- drm/nouveau/nvkm: add a replacement for nvkm_notify (bsc#1223834)
- drm/panel: ili9341: Respect deferred probe (git-fixes).
- drm/panel: ili9341: Use predefined error codes (git-fixes).
- drm/panel: visionox-rm69299: do not unregister DSI device (git-fixes).
- drm/vc4: do not check if plane->state->fb == state->fb (stable-fixes).
- drm/vmwgfx: Enable DMA mappings with SEV (git-fixes).
- drm/vmwgfx: Fix crtc's atomic check conditional (git-fixes).
- drm/vmwgfx: Fix invalid reads in fence signaled events (git-fixes).
- drm/vmwgfx: Sort primary plane formats by order of preference (git-fixes).
- drm: nv04: Fix out of bounds access (git-fixes).
- drm: panel-orientation-quirks: Add quirk for GPD Win Mini (stable-fixes).
- drm: panel-orientation-quirks: Add quirk for Lenovo Legion Go (stable-fixes).
- dump_stack: Do not get cpu_sync for panic CPU (bsc#1223574).
- fbdev: fix incorrect address computation in deferred IO (git-fixes).
- fbdev: viafb: fix typo in hw_bitblt_1 and hw_bitblt_2 (stable-fixes).
- fbmon: prevent division by zero in fb_videomode_from_videomode() (stable-fixes).
- fix build warning
- fuse: do not unhash root (bsc#1223951).
- fuse: fix root lookup with nonzero generation (bsc#1223950).
- hwmon: (amc6821) add of_match table (stable-fixes).
- i2c: pxa: hide unused icr_bits[] variable (git-fixes).
- i2c: smbus: fix NULL function pointer dereference (git-fixes).
- i40e: Fix VF MAC filter removal (git-fixes).
- idma64: Do not try to serve interrupts when device is powered off (git-fixes).
- iio: accel: mxc4005: Interrupt handling fixes (git-fixes).
- iio:imu: adis16475: Fix sync mode setting (git-fixes).
- init/main.c: Fix potential static_command_line memory overflow (git-fixes).
- iommu/amd: Add a length limitation for the ivrs_acpihid command-line parameter (git-fixes).
- iommu/amd: Do not block updates to GATag if guest mode is on (git-fixes).
- iommu/amd: Fix 'Guest Virtual APIC Table Root Pointer' configuration in IRTE (git-fixes).
- iommu/amd: Fix domain flush size when syncing iotlb (git-fixes).
- iommu/amd: Fix error handling for pdev_pri_ats_enable() (git-fixes).
- iommu/arm-smmu-qcom: Limit the SMR groups to 128 (git-fixes).
- iommu/arm-smmu-v3: Acknowledge pri/event queue overflow if any (git-fixes).
- iommu/arm-smmu-v3: Work around MMU-600 erratum 1076982 (git-fixes).
- iommu/fsl: fix all kernel-doc warnings in fsl_pamu.c (git-fixes).
- iommu/iova: Fix alloc iova overflows issue (git-fixes).
- iommu/mediatek: Flush IOTLB completely only if domain has been attached (git-fixes).
- iommu/rockchip: Fix unwind goto issue (git-fixes).
- iommu/sprd: Release dma buffer to avoid memory leak (git-fixes).
- iommu/vt-d: Allocate local memory for page request queue (git-fixes).
- iommu/vt-d: Allow zero SAGAW if second-stage not supported (git-fixes).
- iommu/vt-d: Fix error handling in sva enable/disable paths (git-fixes).
- iommu: Fix error unwind in iommu_group_alloc() (git-fixes).
- ipv6/addrconf: fix a potential refcount underflow for idev (git-fixes).
- kABI: Adjust trace_iterator.wait_index (git-fixes).
- kprobes: Fix double free of kretprobe_holder (bsc#1220901).
- kprobes: Fix possible use-after-free issue on kprobe registration (git-fixes).
- libnvdimm/of_pmem: Use devm_kstrdup instead of kstrdup and check its return value (git-fixes).
- libnvdimm/region: Allow setting align attribute on regions without mappings (git-fixes).
- livepatch: Fix missing newline character in klp_resolve_symbols() (bsc#1223539).
- md/raid1: fix choose next idle in read_balance() (git-fixes).
- md: Do not clear MD_CLOSING when the raid is about to stop (git-fixes).
- md: do not clear MD_RECOVERY_FROZEN for new dm-raid until resume (git-fixes).
- media: cec: core: remove length check of Timer Status (stable-fixes).
- media: sta2x11: fix irq handler cast (stable-fixes).
- mei: me: add arrow lake point H DID (stable-fixes).
- mei: me: add arrow lake point S DID (stable-fixes).
- mei: me: disable RPL-S on SPS and IGN firmwares (git-fixes).
- mm/vmscan: make sure wakeup_kswapd with managed zone (bsc#1223473).
- mmc: sdhci-msm: pervent access to suspended controller (git-fixes).
- mtd: diskonchip: work around ubsan link failure (stable-fixes).
- nd_btt: Make BTT lanes preemptible (git-fixes).
- net: bridge: vlan: fix memory leak in __allowed_ingress (git-fixes).
- net: fix a memleak when uncloning an skb dst and its metadata (git-fixes).
- net: fix skb leak in __skb_tstamp_tx() (git-fixes).
- net: ipv6: ensure we call ipv6_mc_down() at most once (git-fixes).
- net: mld: fix reference count leak in mld_{query | report}_work() (git-fixes).
- net: stream: purge sk_error_queue in sk_stream_kill_queues() (git-fixes).
- net: usb: ax88179_178a: avoid the interface always configured as random address (git-fixes).
- net: usb: ax88179_178a: avoid writing the mac address before first reading (git-fixes).
- net: usb: ax88179_178a: stop lying about skb->truesize (git-fixes).
- net: vlan: fix underflow for the real_dev refcnt (git-fixes).
- netfilter: br_netfilter: Drop dst references before setting (git-fixes).
- netfilter: ipt_CLUSTERIP: fix refcount leak in clusterip_tg_check() (git-fixes).
- netfilter: nft_ct: fix l3num expectations with inet pseudo family (git-fixes).
- nfsd: Fixed mount issue with KOTD (bsc#1223380 bsc#1217408 bsc#1223640).
- nfsd: use __fput_sync() to avoid delayed closing of files (bsc#1223380 bsc#1217408).
- nilfs2: fix OOB in nilfs_set_de_type (git-fixes).
- nilfs2: fix OOB in nilfs_set_de_type (git-fixes).
- nouveau: fix function cast warning (git-fixes).
- nouveau: fix instmem race condition around ptr stores (git-fixes).
- nvdimm/namespace: drop nested variable in create_namespace_pmem() (git-fixes).
- nvdimm: Allow overwrite in the presence of disabled dimms (git-fixes).
- nvdimm: Fix badblocks clear off-by-one error (git-fixes).
- nvdimm: Fix dereference after free in register_nvdimm_pmu() (git-fixes).
- nvdimm: Fix firmware activation deadlock scenarios (git-fixes).
- nvdimm: Fix memleak of pmu attr_groups in unregister_nvdimm_pmu() (git-fixes).
- pci_iounmap(): Fix MMIO mapping leak (git-fixes).
- phy: tegra: xusb: Add API to retrieve the port number of phy (stable-fixes).
- pinctrl: renesas: checker: Limit cfg reg enum checks to provided IDs (stable-fixes).
- platform/x86: intel-vbtn: Update tablet mode switch at end of probe (git-fixes).
- platform/x86: touchscreen_dmi: Add an extra entry for a variant of the Chuwi Vi8 tablet (stable-fixes).
- powerpc/kasan: Do not instrument non-maskable or raw interrupts (bsc#1223191).
- powerpc/pseries/iommu: LPAR panics when rebooted with a frozen PE (bsc#1222011 ltc#205900).
- powerpc/rtas: define pr_fmt and convert printk call sites (bsc#1223369 ltc#205888).
- powerpc/rtas: export rtas_error_rc() for reuse (bsc#1223369 ltc#205888).
- powerpc: Avoid nmi_enter/nmi_exit in real mode interrupt (bsc#1221645 ltc#205739 bsc#1223191).
- powerpc: Refactor verification of MSR_RI (bsc#1223191).
- printk: Add this_cpu_in_panic() (bsc#1223574).
- printk: Adjust mapping for 32bit seq macros (bsc#1223574).
- printk: Avoid non-panic CPUs writing to ringbuffer (bsc#1223574).
- printk: Disable passing console lock owner completely during panic() (bsc#1223574).
- printk: Drop console_sem during panic (bsc#1223574).
- printk: Rename abandon_console_lock_in_panic() to other_cpu_in_panic() (bsc#1223574).
- printk: Use prb_first_seq() as base for 32bit seq macros (bsc#1223574).
- printk: Wait for all reserved records with pr_flush() (bsc#1223574).
- printk: nbcon: Relocate 32bit seq macros (bsc#1223574).
- printk: ringbuffer: Clarify special lpos values (bsc#1223574).
- printk: ringbuffer: Cleanup reader terminology (bsc#1223574).
- printk: ringbuffer: Do not skip non-finalized records with prb_next_seq() (bsc#1223574).
- printk: ringbuffer: Improve prb_next_seq() performance (bsc#1223574).
- printk: ringbuffer: Skip non-finalized records in panic (bsc#1223574).
- pstore/zone: Add a null pointer check to the psz_kmsg_read (stable-fixes).
- ring-buffer: Do not set shortest_full when full target is hit (git-fixes).
- ring-buffer: Fix full_waiters_pending in poll (git-fixes).
- ring-buffer: Fix resetting of shortest_full (git-fixes).
- ring-buffer: Fix waking up ring buffer readers (git-fixes).
- ring-buffer: Make wake once of ring_buffer_wait() more robust (git-fixes).
- ring-buffer: Use wait_event_interruptible() in ring_buffer_wait() (git-fixes).
- ring-buffer: use READ_ONCE() to read cpu_buffer->commit_page in concurrent environment (git-fixes).
- s390/cio: Ensure the copied buf is NUL terminated (git-fixes bsc#1223875).
- s390/decompressor: fix misaligned symbol build error (git-fixes bsc#1223785).
- s390/mm: Fix clearing storage keys for huge pages (git-fixes bsc#1223877).
- s390/mm: Fix storage key clearing for guest huge pages (git-fixes bsc#1223878).
- s390/qeth: Fix kernel panic after setting hsuid (git-fixes bsc#1223879).
- s390/scm: fix virtual vs physical address confusion (git-fixes bsc#1223784).
- s390/vdso: Add CFI for RA register to asm macro vdso_func (git-fixes bsc#1223876).
- s390/vdso: drop '-fPIC' from LDFLAGS (git-fixes bsc#1223598).
- s390/zcrypt: fix reference counting on zcrypt card objects (git-fixes bsc#1223595).
- s390: Fixed LPM of lpar failure with error HSCLA2CF in 19th loops (jsc#PED-542 git-fixes bsc#1213573 ltc#203238).
- s390: Fixed kernel backtrack (bsc#1141539 git-fixes).
- serial/pmac_zilog: Remove flawed mitigation for rx irq flood (git-fixes).
- serial: core: Provide port lock wrappers (stable-fixes).
- serial: core: fix kernel-doc for uart_port_unlock_irqrestore() (git-fixes).
- serial: mxs-auart: add spinlock around changing cts state (git-fixes).
- slimbus: qcom-ngd-ctrl: Add timeout for wait operation (git-fixes).
- speakup: Avoid crash on very long word (git-fixes).
- speakup: Fix 8bit characters from direct synth (git-fixes).
- tcp/udp: Fix memleaks of sk and zerocopy skbs with TX timestamp (git-fixes).
- thunderbolt: Avoid notify PM core about runtime PM resume (stable-fixes).
- thunderbolt: Fix wake configurations after device unplug (stable-fixes).
- tracing/net_sched: Fix tracepoints that save qdisc_dev() as a string (git-fixes).
- tracing/ring-buffer: Fix wait_on_pipe() race (git-fixes).
- tracing: Have saved_cmdlines arrays all in one allocation (git-fixes).
- tracing: Remove precision vsnprintf() check from print event (git-fixes).
- tracing: Show size of requested perf buffer (git-fixes).
- tracing: Use .flush() call to wake up readers (git-fixes).
- usb: Disable USB3 LPM at shutdown (stable-fixes).
- usb: Fix regression caused by invalid ep0 maxpacket in virtual SuperSpeed device (git-fixes).
- usb: dwc2: host: Fix dereference issue in DDMA completion flow (git-fixes).
- usb: gadget: composite: fix OS descriptors w_value logic (git-fixes).
- usb: gadget: f_fs: Fix a race condition when processing setup packets (git-fixes).
- usb: gadget: f_ncm: Fix UAF ncm object at re-bind after usb ep transport error (stable-fixes).
- usb: gadget: tegra-xudc: Fix USB3 PHY retrieval logic (git-fixes).
- usb: ohci: Prevent missed ohci interrupts (git-fixes).
- usb: sl811-hcd: only defined function checkdone if QUIRK2 is defined (stable-fixes).
- usb: typec: tcpci: add generic tcpci fallback compatible (stable-fixes).
- usb: typec: tcpm: Check for port partner validity before consuming it (git-fixes).
- usb: typec: tcpm: unregister existing source caps before re-registration (bsc#1220569).
- usb: typec: ucsi: Ack unsupported commands (stable-fixes).
- usb: typec: ucsi: Clear UCSI_CCI_RESET_COMPLETE before reset (stable-fixes).
- usb: typec: ucsi: Fix connector check on init (git-fixes).
- usb: udc: remove warning when queue disabled ep (stable-fixes).
- vdpa/mlx5: Allow CVQ size changes (git-fixes).
- virtio: treat alloc_dax() -EOPNOTSUPP failure as non-fatal (bsc#1223949).
- wifi: ath9k: fix LNA selection in ath_ant_try_scan() (stable-fixes).
- wifi: iwlwifi: mvm: remove old PASN station when adding a new one (git-fixes).
- wifi: iwlwifi: mvm: return uid from iwl_mvm_build_scan_cmd (git-fixes).
- wifi: mac80211: check/clear fast rx for non-4addr sta VLAN changes (stable-fixes).
- wifi: nl80211: do not free NULL coalescing rule (git-fixes).
- x86/cpufeatures: Fix dependencies for GFNI, VAES, and VPCLMULQDQ (git-fixes).
- x86/mm: Ensure input to pfn_to_kaddr() is treated as a 64-bit type (jsc#PED-7167 git-fixes).
- x86/sev: Skip ROM range scans and validation for SEV-SNP guests (jsc#PED-7167 git-fixes).
- x86/xen: Add some null pointer checking to smp.c (git-fixes).
- x86/xen: add CPU dependencies for 32-bit build (git-fixes).
- x86/xen: fix percpu vcpu_info allocation (git-fixes).
- xen-netback: properly sync TX responses (git-fixes).
- xen-netfront: Add missing skb_mark_for_recycle (git-fixes).
- xen/gntdev: Fix the abuse of underlying struct page in DMA-buf import (git-fixes).
- xen/xenbus: document will_handle argument for xenbus_watch_path() (git-fixes).
- xfrm6: fix inet6_dev refcount underflow problem (git-fixes).
    Patchnames
SUSE-2024-1663,SUSE-SLE-Micro-5.5-2024-1663,SUSE-SLE-Module-Live-Patching-15-SP5-2024-1663,SUSE-SLE-Module-RT-15-SP5-2024-1663,openSUSE-SLE-15.5-2024-1663
    Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
    {
  "document": {
    "aggregate_severity": {
      "namespace": "https://www.suse.com/support/security/rating/",
      "text": "important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright 2024 SUSE LLC. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Security update for the Linux Kernel",
        "title": "Title of the patch"
      },
      {
        "category": "description",
        "text": "\nThe SUSE Linux Enterprise 15 SP5 Real Time kernel was updated to receive various security bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2024-27389: Fixed pstore inode handling with d_invalidate() (bsc#1223705).\n- CVE-2024-27062: Fixed nouveau lock inside client object tree (bsc#1223834).\n- CVE-2024-27056: Fixed wifi/iwlwifi/mvm to ensure offloading TID queue exists (bsc#1223822).\n- CVE-2024-27046: Fixed nfp/flower handling acti_netdevs allocation failure (bsc#1223827).\n- CVE-2024-27043: Fixed a use-after-free in edia/dvbdev in different places (bsc#1223824).\n- CVE-2024-27041: Fixed drm/amd/display NULL checks for adev-\u003edm.dc in amdgpu_dm_fini() (bsc#1223714).\n- CVE-2024-27039: Fixed clk/hisilicon/hi3559a an erroneous devm_kfree() (bsc#1223821).\n- CVE-2024-27038: Fixed clk_core_get NULL pointer dereference (bsc#1223816).\n- CVE-2024-27030: Fixed octeontx2-af to use separate handlers for interrupts (bsc#1223790).\n- CVE-2024-27014: Fixed net/mlx5e to prevent deadlock while disabling aRFS (bsc#1223735).\n- CVE-2024-27013: Fixed tun limit printing rate when illegal packet received by tun device (bsc#1223745).\n- CVE-2024-26993: Fixed fs/sysfs reference leak in sysfs_break_active_protection() (bsc#1223693).\n- CVE-2024-26982: Fixed Squashfs inode number check not to be an invalid value of zero (bsc#1223634).\n- CVE-2024-26970: Fixed clk/qcom/gcc-ipq6018 termination of frequency table arrays (bsc#1223644).\n- CVE-2024-26969: Fixed clk/qcom/gcc-ipq8074 termination of frequency table arrays (bsc#1223645).\n- CVE-2024-26966: Fixed clk/qcom/mmcc-apq8084 termination of frequency table arrays (bsc#1223646).\n- CVE-2024-26965: Fixed clk/qcom/mmcc-msm8974 termination of frequency table arrays (bsc#1223648).\n- CVE-2024-26960: Fixed mm/swap race between free_swap_and_cache() and swapoff() (bsc#1223655).\n- CVE-2024-26951: Fixed wireguard/netlink check for dangling peer via is_dead instead of empty list (bsc#1223660).\n- CVE-2024-26950: Fixed wireguard/netlink to access device through ctx instead of peer (bsc#1223661).\n- CVE-2024-26948: Fixed drm/amd/display by adding dc_state NULL check in dc_state_release (bsc#1223664).\n- CVE-2024-26927: Fixed ASoC/SOF bounds checking to firmware data Smatch (bsc#1223525).\n- CVE-2024-26901: Fixed do_sys_name_to_handle() to use kzalloc() to prevent kernel-infoleak (bsc#1223198).\n- CVE-2024-26896: Fixed wifi/wfx memory leak when starting AP (bsc#1223042).\n- CVE-2024-26893: Fixed firmware/arm_scmi for possible double free in SMC transport cleanup path (bsc#1223196).\n- CVE-2024-26885: Fixed bpf DEVMAP_HASH overflow check on 32-bit arches (bsc#1223190).\n- CVE-2024-26884: Fixed bpf hashtab overflow check on 32-bit arches (bsc#1223189).\n- CVE-2024-26883: Fixed bpf stackmap overflow check on 32-bit arches (bsc#1223035).\n- CVE-2024-26882: Fixed net/ip_tunnel to make sure to pull inner header in ip_tunnel_rcv() (bsc#1223034).\n- CVE-2024-26881: Fixed net/hns3 kernel crash when 1588 is received on HIP08 devices (bsc#1223041).\n- CVE-2024-26879: Fixed clk/meson by adding missing clocks to axg_clk_regmaps (bsc#1223066).\n- CVE-2024-26878: Fixed quota for potential NULL pointer dereference (bsc#1223060).\n- CVE-2024-26866: Fixed spi/spi-fsl-lpspi by removing redundant spi_controller_put call (bsc#1223024).\n- CVE-2024-26862: Fixed packet annotate data-races around ignore_outgoing (bsc#1223111).\n- CVE-2024-26861: Fixed wireguard/receive annotate data-race around receiving_counter.counter (bsc#1223076).\n- CVE-2024-26857: Fixed geneve to make sure to pull inner header in geneve_rx() (bsc#1223058).\n- CVE-2024-26856: Fixed use-after-free inside sparx5_del_mact_entry (bsc#1223052).\n- CVE-2024-26855: Fixed net/ice potential NULL pointer dereference in ice_bridge_setlink() (bsc#1223051).\n- CVE-2024-26853: Fixed igc returning frame twice in XDP_REDIRECT (bsc#1223061).\n- CVE-2024-26852: Fixed net/ipv6 to avoid possible UAF in ip6_route_mpath_notify() (bsc#1223057).\n- CVE-2024-26848: Fixed afs endless loop in directory parsing (bsc#1223030).\n- CVE-2024-26836: Fixed platform/x86/think-lmi password opcode ordering for workstations (bsc#1222968).\n- CVE-2024-26830: Fixed i40e to not allow untrusted VF to remove administratively set MAC (bsc#1223012).\n- CVE-2024-26817: Fixed amdkfd to use calloc instead of kzalloc to avoid integer overflow (bsc#1222812).\n- CVE-2024-26816: Fixed relocations in .notes section when building with CONFIG_XEN_PV=y by ignoring them (bsc#1222624).\n- CVE-2024-26807: Fixed spi/cadence-qspi NULL pointer reference in runtime PM hooks (bsc#1222801).\n- CVE-2024-26805: Fixed a kernel-infoleak-after-free in __skb_datagram_iter in netlink  (bsc#1222630).\n- CVE-2024-26793: Fixed an use-after-free and null-ptr-deref in gtp_newlink() in gtp  (bsc#1222428).\n- CVE-2024-26783: Fixed mm/vmscan bug when calling wakeup_kswapd() with a wrong zone index (bsc#1222615).\n- CVE-2024-26779: Fixed a race condition on enabling fast-xmit in mac80211 (bsc#1222772).\n- CVE-2024-26773: Fixed ext4 block allocation from corrupted group in ext4_mb_try_best_found() (bsc#1222618).\n- CVE-2024-26772: Fixed ext4 to avoid allocating blocks from corrupted group in ext4_mb_find_by_goal() (bsc#1222613).\n- CVE-2024-26771: Fixed a null pointer dereference on edma_probe in dmaengine ti edma  (bsc#1222610)\n- CVE-2024-26766: Fixed SDMA off-by-one error in _pad_sdma_tx_descs() (bsc#1222726).\n- CVE-2024-26764: Fixed IOCB_AIO_RW check in fs/aio before the struct aio_kiocb conversion (bsc#1222721).\n- CVE-2024-26763: Fixed user corruption via by writing data with O_DIRECT on device in dm-crypt (bsc#1222720).\n- CVE-2024-26760: Fixed scsi/target/pscsi bio_put() for error case (bsc#1222596).\n- CVE-2024-267600: Fixed scsi/target/pscsi error case in bio_put() (bsc#1222596).\n- CVE-2024-26754: Fixed an use-after-free and null-ptr-deref in gtp_genl_dump_pdp() in gtp  (bsc#1222632).\n- CVE-2024-26751: Fixed ARM/ep93xx terminator to gpiod_lookup_table (bsc#1222724).\n- CVE-2024-26747: Fixed a NULL pointer issue with USB parent module\u0027s reference (bsc#1222609).\n- CVE-2024-26744: Fixed null pointer dereference in srpt_service_guid parameter in rdma/srpt (bsc#1222449).\n- CVE-2024-26743: Fixed memory leak in qedr_create_user_qp error flow in rdma/qedr (bsc#1222677).\n- CVE-2024-26737: Fixed selftests/bpf racing between bpf_timer_cancel_and_free and bpf_timer_cancel (bsc#1222557).\n- CVE-2024-26733: Fixed an overflow in arp_req_get() in arp (bsc#1222585).\n- CVE-2024-26727: Fixed assertion if a newly created btrfs subvolume already gets read (bsc#1222536).\n- CVE-2024-26718: Fixed dm-crypt/dm-verity disable tasklets (bsc#1222416).\n- CVE-2024-26704: Fixed a double-free of blocks due to wrong extents moved_len in ext4 (bsc#1222422).\n- CVE-2024-26696: Fixed nilfs2 hang in nilfs_lookup_dirty_data_buffers() (bsc#1222549).\n- CVE-2024-26689: Fixed a use-after-free in encode_cap_msg() (bsc#1222503).\n- CVE-2024-26687: Fixed xen/events close evtchn after mapping cleanup (bsc#1222435).\n- CVE-2024-26685: Fixed nilfs2 potential bug in end_buffer_async_write (bsc#1222437).\n- CVE-2024-26684: Fixed net/stmmac/xgmac handling of DPP safety error for DMA channels (bsc#1222445).\n- CVE-2024-26681: Fixed netdevsim to avoid potential loop in nsim_dev_trap_report_work() (bsc#1222431).\n- CVE-2024-26680: Fixed net/atlantic DMA mapping for PTP hwts ring (bsc#1222427).\n- CVE-2024-26675: Fixed ppp_async to limit MRU to 64K (bsc#1222379).\n- CVE-2024-26673: Fixed netfilter/nft_ct layer 3 and 4 protocol sanitization (bsc#1222368).\n- CVE-2024-26671: Fixed blk-mq IO hang from sbitmap wakeup race (bsc#1222357).\n- CVE-2024-26660: Fixed drm/amd/display bounds check for stream encoder creation (bsc#1222266).\n- CVE-2024-26656: Fixed drm/amdgpu use-after-free bug (bsc#1222307).\n- CVE-2024-26610: Fixed memory corruption in wifi/iwlwifi (bsc#1221299).\n- CVE-2024-26601: Fixed ext4 buddy bitmap corruption via fast commit replay (bsc#1220342).\n- CVE-2024-23850: Fixed double free of anonymous device after snapshot  creation failure (bsc#1219126).\n- CVE-2024-23848: Fixed media/cec for possible use-after-free in cec_queue_msg_fh (bsc#1219104).\n- CVE-2024-23307: Fixed Integer Overflow or Wraparound vulnerability in x86 and ARM md, raid, raid5 modules (bsc#1219169).\n- CVE-2024-22099: Fixed a null-pointer-dereference in rfcomm_check_security (bsc#1219170).\n- CVE-2024-0841: Fixed a null pointer dereference in the hugetlbfs_fill_super function in hugetlbfs (HugeTLB pages) functionality (bsc#1219264).\n- CVE-2024-0639: Fixed a denial-of-service vulnerability due to a deadlock found in sctp_auto_asconf_init in net/sctp/socket.c (bsc#1218917).\n- CVE-2023-6270: Fixed a use-after-free issue in aoecmd_cfg_pkts (bsc#1218562).\n- CVE-2023-52652: Fixed NTB for possible name leak in ntb_register_device() (bsc#1223686).\n- CVE-2023-52645: Fixed pmdomain/mediatek race conditions with genpd (bsc#1223033).\n- CVE-2023-52636: Fixed libceph cursor init when preparing sparse read in msgr2 (bsc#1222247).\n- CVE-2023-52635: Fixed PM/devfreq to synchronize devfreq_monitor_[start/stop] (bsc#1222294).\n- CVE-2023-52627: Fixed iio:adc:ad7091r exports into IIO_AD7091R namespace (bsc#1222051).\n- CVE-2023-52620: Fixed netfilter/nf_tables to disallow timeout for anonymous sets never used from userspace (bsc#1221825).\n- CVE-2023-52616: Fixed unexpected pointer access in crypto/lib/mpi in mpi_ec_init (bsc#1221612).\n- CVE-2023-52614: Fixed PM/devfreq buffer overflow in trans_stat_show (bsc#1221617).\n- CVE-2023-52593: Fixed wifi/wfx possible NULL pointer dereference in wfx_set_mfp_ap() (bsc#1221042).\n- CVE-2023-52591: Fixed a possible reiserfs filesystem corruption via directory renaming (bsc#1221044).\n- CVE-2023-52590: Fixed a possible ocfs2 filesystem corruption via directory renaming (bsc#1221088).\n- CVE-2023-52589: Fixed media/rkisp1 IRQ disable race issue (bsc#1221084).\n- CVE-2023-52585: Fixed drm/amdgpu for possible NULL pointer dereference in amdgpu_ras_query_error_status_helper() (bsc#1221080).\n- CVE-2023-52561: Fixed arm64/dts/qcom/sdm845-db845c to mark cont splash memory region (bsc#1220935).\n- CVE-2023-52503: Fixed tee/amdtee use-after-free vulnerability in amdtee_close_session (bsc#1220915).\n- CVE-2023-52488: Fixed serial/sc16is7xx convert from _raw_ to _noinc_ regmap functions for FIFO (bsc#1221162).\n- CVE-2022-48701: Fixed an out-of-bounds bug in __snd_usb_parse_audio_interface() (bsc#1223921).\n- CVE-2022-48662: Fixed a general protection fault (GPF) in i915_perf_open_ioctl (bsc#1223505).\n- CVE-2022-48659: Fixed mm/slub to return errno if kmalloc() fails (bsc#1223498).\n- CVE-2022-48658: Fixed mm/slub to avoid a problem in flush_cpu_slab()/__free_slab() task context (bsc#1223496).\n- CVE-2022-48651: Fixed an out-of-bound bug in ipvlan caused by unset skb-\u003emac_header (bsc#1223513).\n- CVE-2022-48642: Fixed netfilter/nf_tables percpu memory leak at nf_tables_addchain() (bsc#1223478).\n- CVE-2022-48640: Fixed bonding for possible NULL pointer dereference in bond_rr_gen_slave_id (bsc#1223499).\n- CVE-2022-48631: Fixed a bug in ext4, when parsing extents where eh_entries == 0 and eh_depth \u003e 0 (bsc#1223475).\n- CVE-2021-47214: Fixed hugetlb/userfaultfd during restore reservation in hugetlb_mcopy_atomic_pte() (bsc#1222710).\n- CVE-2021-47211: Fixed a null pointer dereference on pointer cs_desc in usb-audio (bsc#1222869).\n- CVE-2021-47207: Fixed a null pointer dereference on pointer block in gus (bsc#1222790).\n- CVE-2021-47205: Unregistered clocks/resets when unbinding in sunxi-ng (bsc#1222888).\n- CVE-2021-47202: Fixed NULL pointer dereferences in of_thermal_ functions (bsc#1222878)\n- CVE-2021-47200: Fixed drm/prime for possible use-after-free in mmap within drm_gem_ttm_mmap() and drm_gem_ttm_mmap() (bsc#1222838).\n- CVE-2021-47195: Fixed use-after-free inside SPI via add_lock mutex (bsc#1222832).\n- CVE-2021-47189: Fixed denial of service due to memory ordering issues between normal and ordered work functions in btrfs (bsc#1222706).\n- CVE-2021-47185: Fixed a softlockup issue in flush_to_ldisc in tty tty_buffer (bsc#1222669).\n- CVE-2021-47184: Fixed NULL pointer dereference on VSI filter sync (bsc#1222666).\n- CVE-2021-47183: Fixed a null pointer dereference during link down processing in scsi lpfc (bsc#1192145, bsc#1222664).\n- CVE-2021-47182: Fixed scsi_mode_sense() buffer length handling (bsc#1222662).\n- CVE-2021-47181: Fixed a null pointer dereference caused by calling platform_get_resource()  (bsc#1222660).\n\nThe following non-security bugs were fixed:\n\n- ALSA: firewire-lib: handle quirk to calculate payload quadlets as data block counter (stable-fixes).\n- ALSA: hda/realtek - Enable audio jacks of Haier Boyue G42 with ALC269VC (stable-fixes).\n- ALSA: hda/realtek - Fix inactive headset mic jack (stable-fixes).\n- ALSA: hda/realtek: Add quirk for HP SnowWhite laptops (stable-fixes).\n- ALSA: hda/realtek: Fix mute led of HP Laptop 15-da3001TU (stable-fixes).\n- ALSA: hda: intel-sdw-acpi: fix usage of device_get_named_child_node() (git-fixes).\n- ALSA: scarlett2: Add Focusrite Clarett 2Pre and 4Pre USB support (stable-fixes).\n- ALSA: scarlett2: Add Focusrite Clarett+ 2Pre and 4Pre support (stable-fixes).\n- ALSA: scarlett2: Add correct product series name to messages (stable-fixes).\n- ALSA: scarlett2: Add support for Clarett 8Pre USB (stable-fixes).\n- ALSA: scarlett2: Default mixer driver to enabled (stable-fixes).\n- ALSA: scarlett2: Move USB IDs out from device_info struct (stable-fixes).\n- ASoC: meson: axg-card: make links nonatomic (git-fixes).\n- ASoC: meson: axg-tdm-interface: manage formatters in trigger (git-fixes).\n- ASoC: meson: cards: select SND_DYNAMIC_MINORS (git-fixes).\n- ASoC: soc-core.c: Skip dummy codec when adding platforms (stable-fixes).\n- ASoC: tegra: Fix DSPK 16-bit playback (git-fixes).\n- ASoC: ti: davinci-mcasp: Fix race condition during probe (git-fixes).\n- Bluetooth: Add new quirk for broken read key length on ATS2851 (git-fixes).\n- Bluetooth: Fix TOCTOU in HCI debugfs implementation (git-fixes).\n- Bluetooth: Fix memory leak in hci_req_sync_complete() (git-fixes).\n- Bluetooth: Fix type of len in {l2cap,sco}_sock_getsockopt_old() (stable-fixes).\n- Bluetooth: L2CAP: Fix not validating setsockopt user input (git-fixes).\n- Bluetooth: RFCOMM: Fix not validating setsockopt user input (git-fixes).\n- Bluetooth: SCO: Fix not validating setsockopt user input (git-fixes).\n- Bluetooth: add quirk for broken address properties (git-fixes).\n- Bluetooth: btintel: Fix null ptr deref in btintel_read_version (stable-fixes).\n- Bluetooth: btintel: Fixe build regression (git-fixes).\n- Bluetooth: btusb: Add Realtek RTL8852BE support ID 0x0bda:0x4853 (stable-fixes).\n- Bluetooth: hci_event: Fix sending HCI_OP_READ_ENC_KEY_SIZE (git-fixes).\n- Bluetooth: hci_event: set the conn encrypted before conn establishes (stable-fixes).\n- Bluetooth: hci_sock: Fix not validating setsockopt user input (git-fixes).\n- Bluetooth: qca: fix NULL-deref on non-serdev suspend (git-fixes).\n- Documentation: Add missing documentation for EXPORT_OP flags (stable-fixes).\n- HID: intel-ish-hid: ipc: Fix dev_err usage with uninitialized dev-\u003edevc (git-fixes).\n- HID: logitech-dj: allow mice to use all types of reports (git-fixes).\n- HID: uhid: Use READ_ONCE()/WRITE_ONCE() for -\u003erunning (stable-fixes).\n- Input: allocate keycode for Display refresh rate toggle (stable-fixes).\n- Input: synaptics-rmi4 - fail probing if memory allocation for \u0027phys\u0027 fails (stable-fixes).\n- NFC: trf7970a: disable all regulators on removal (git-fixes).\n- NFS: avoid spurious warning of lost lock that is being unlocked (bsc#1221791).\n- PCI/AER: Block runtime suspend when handling errors (git-fixes).\n- PCI/DPC: Quirk PIO log size for Intel Ice Lake Root Ports (git-fixes).\n- PCI/DPC: Quirk PIO log size for Intel Raptor Lake Root Ports (git-fixes).\n- PCI/DPC: Quirk PIO log size for certain Intel Root Ports (git-fixes).\n- PCI/PM: Drain runtime-idle callbacks before driver removal (git-fixes).\n- PCI: Drop pci_device_remove() test of pci_dev-\u003edriver (git-fixes).\n- PCI: rpaphp: Error out on busy status from get-sensor-state (bsc#1223369 ltc#205888).\n- RAS: Avoid build errors when CONFIG_DEBUG_FS=n (jsc#PED-7619).\n- RDMA/cm: Print the old state when cm_destroy_id gets timeout (git-fixes).\n- RDMA/cm: add timeout to cm_destroy_id wait (git-fixes)\n- README.BRANCH: Correct email address for Petr Tesarik\n- README.BRANCH: Remove copy of branch name\n- Reapply \u0027drm/qxl: simplify qxl_fence_wait\u0027 (stable-fixes).\n- Revert \u0027ACPI: PM: Block ASUS B1400CEAE from suspend to idle by default\u0027 (stable-fixes).\n- Revert \u0027drm/qxl: simplify qxl_fence_wait\u0027 (git-fixes).\n- Revert \u0027ice: Fix ice VF reset during iavf initialization (jsc#PED-376).\u0027 (bsc#1223275)\n- Revert \u0027usb: cdc-wdm: close race between read and workqueue\u0027 (git-fixes).\n- Revert \u0027usb: phy: generic: Get the vbus supply\u0027 (git-fixes).\n- USB: UAS: return ENODEV when submit urbs fail with device not attached (stable-fixes).\n- USB: serial: add device ID for VeriFone adapter (stable-fixes).\n- USB: serial: cp210x: add ID for MGP Instruments PDS100 (stable-fixes).\n- USB: serial: cp210x: add pid/vid for TDK NC0110013M and MM0110113M (stable-fixes).\n- USB: serial: ftdi_sio: add support for GMC Z216C Adapter IR-USB (stable-fixes).\n- USB: serial: option: add Fibocom FM135-GL variants (stable-fixes).\n- USB: serial: option: add Lonsung U8300/U9300 product (stable-fixes).\n- USB: serial: option: add MeiG Smart SLM320 product (stable-fixes).\n- USB: serial: option: add Rolling RW101-GL and RW135-GL support (stable-fixes).\n- USB: serial: option: add Telit FN920C04 rmnet compositions (stable-fixes).\n- USB: serial: option: add support for Fibocom FM650/FG650 (stable-fixes).\n- USB: serial: option: support Quectel EM060K sub-models (stable-fixes).\n- ahci: asm1064: asm1166: do not limit reported ports (git-fixes).\n- ahci: asm1064: correct count of reported ports (stable-fixes).\n- arm64: dts: imx8-ss-conn: fix usdhc wrong lpcg clock order (git-fixes)\n- arm64: dts: rockchip: Remove unsupported node from the Pinebook Pro (git-fixes)\n- arm64: dts: rockchip: enable internal pull-up for Q7_THRM# on RK3399 (git-fixes)\n- arm64: dts: rockchip: enable internal pull-up on PCIE_WAKE# for (git-fixes)\n- arm64: dts: rockchip: enable internal pull-up on Q7_USB_ID for RK3399 (git-fixes)\n- arm64: dts: rockchip: fix rk3328 hdmi ports node (git-fixes)\n- arm64: dts: rockchip: fix rk3399 hdmi ports node (git-fixes)\n- arm64: hibernate: Fix level3 translation fault in swsusp_save() (git-fixes).\n- ax25: fix use-after-free bugs caused by ax25_ds_del_timer (git-fixes).\n- batman-adv: Avoid infinite loop trying to resize local TT (git-fixes).\n- bcache: Fix __bch_btree_node_alloc to make the failure behavior consistent (git-fixes).\n- bcache: Remove dead references to cache_readaheads (git-fixes).\n- bcache: Remove unnecessary NULL point check in node allocations (git-fixes).\n- bcache: add code comments for bch_btree_node_get() and __bch_btree_node_alloc() (git-fixes).\n- bcache: avoid NULL checking to c-\u003eroot in run_cache_set() (git-fixes).\n- bcache: avoid oversize memory allocation by small stripe_size (git-fixes).\n- bcache: bset: Fix comment typos (git-fixes).\n- bcache: check return value from btree_node_alloc_replacement() (git-fixes).\n- bcache: fix NULL pointer reference in cached_dev_detach_finish (git-fixes).\n- bcache: fix error info in register_bcache() (git-fixes).\n- bcache: fixup bcache_dev_sectors_dirty_add() multithreaded CPU false sharing (git-fixes).\n- bcache: fixup btree_cache_wait list damage (git-fixes).\n- bcache: fixup init dirty data errors (git-fixes).\n- bcache: fixup lock c-\u003eroot error (git-fixes).\n- bcache: fixup multi-threaded bch_sectors_dirty_init() wake-up race (git-fixes).\n- bcache: move calc_cached_dev_sectors to proper place on backing device detach (git-fixes).\n- bcache: move uapi header bcache.h to bcache code directory (git-fixes).\n- bcache: prevent potential division by zero error (git-fixes).\n- bcache: remove EXPERIMENTAL for Kconfig option \u0027Asynchronous device registration\u0027 (git-fixes).\n- bcache: remove redundant assignment to variable cur_idx (git-fixes).\n- bcache: remove the backing_dev_name field from struct cached_dev (git-fixes).\n- bcache: remove the cache_dev_name field from struct cache (git-fixes).\n- bcache: remove unnecessary flush_workqueue (git-fixes).\n- bcache: remove unused bch_mark_cache_readahead function def in stats.h (git-fixes).\n- bcache: replace a mistaken IS_ERR() by IS_ERR_OR_NULL() in btree_gc_coalesce() (git-fixes).\n- bcache: replace snprintf in show functions with sysfs_emit (git-fixes).\n- bcache: revert replacing IS_ERR_OR_NULL with IS_ERR (git-fixes).\n- bcache: use bvec_kmap_local in bch_data_verify (git-fixes).\n- bcache: use bvec_kmap_local in bio_csum (git-fixes).\n- bcache: use default_groups in kobj_type (git-fixes).\n- bcache:: fix repeated words in comments (git-fixes).\n- ceph: stop copying to iter at EOF on sync reads (bsc#1223068).\n- ceph: switch to corrected encoding of max_xattr_size in mdsmap (bsc#1223067).\n- clk: Get runtime PM before walking tree during disable_unused (git-fixes).\n- clk: Initialize struct clk_core kref earlier (stable-fixes).\n- clk: Mark \u0027all_lists\u0027 as const (stable-fixes).\n- clk: Print an info line before disabling unused clocks (stable-fixes).\n- clk: Remove prepare_lock hold assertion in __clk_release() (git-fixes).\n- clk: remove extra empty line (stable-fixes).\n- comedi: vmk80xx: fix incomplete endpoint checking (git-fixes).\n- dm cache policy smq: ensure IO does not prevent cleaner policy progress (git-fixes).\n- dm cache: add cond_resched() to various workqueue loops (git-fixes).\n- dm clone: call kmem_cache_destroy() in dm_clone_init() error path (git-fixes).\n- dm crypt: add cond_resched() to dmcrypt_write() (git-fixes).\n- dm crypt: avoid accessing uninitialized tasklet (git-fixes).\n- dm flakey: do not corrupt the zero page (git-fixes).\n- dm flakey: fix a bug with 32-bit highmem systems (git-fixes).\n- dm flakey: fix a crash with invalid table line (git-fixes).\n- dm flakey: fix logic when corrupting a bio (git-fixes).\n- dm init: add dm-mod.waitfor to wait for asynchronously probed block devices (git-fixes).\n- dm integrity: call kmem_cache_destroy() in dm_integrity_init() error path (git-fixes).\n- dm integrity: fix out-of-range warning (git-fixes).\n- dm integrity: reduce vmalloc space footprint on 32-bit architectures (git-fixes).\n- dm raid: clean up four equivalent goto tags in raid_ctr() (git-fixes).\n- dm raid: fix false positive for requeue needed during reshape (git-fixes).\n- dm raid: fix missing reconfig_mutex unlock in raid_ctr() error paths (git-fixes).\n- dm stats: check for and propagate alloc_percpu failure (git-fixes).\n- dm thin metadata: Fix ABBA deadlock by resetting dm_bufio_client (git-fixes).\n- dm thin metadata: check fail_io before using data_sm (git-fixes).\n- dm thin: add cond_resched() to various workqueue loops (git-fixes).\n- dm thin: fix deadlock when swapping to thin device (bsc#1177529).\n- dm verity: do not perform FEC for failed readahead IO (git-fixes).\n- dm verity: fix error handling for check_at_most_once on FEC (git-fixes).\n- dm zoned: free dmz-\u003eddev array in dmz_put_zoned_devices (git-fixes).\n- dm-delay: fix a race between delay_presuspend and delay_bio (git-fixes).\n- dm-integrity: do not modify bio\u0027s immutable bio_vec in integrity_metadata() (git-fixes).\n- dm-raid: fix lockdep waring in \u0027pers-\u003ehot_add_disk\u0027 (git-fixes).\n- dm-verity, dm-crypt: align \u0027struct bvec_iter\u0027 correctly (git-fixes).\n- dm-verity: align struct dm_verity_fec_io properly (git-fixes).\n- dm: add cond_resched() to dm_wq_work() (git-fixes).\n- dm: call the resume method on internal suspend (git-fixes).\n- dm: do not lock fs when the map is NULL during suspend or resume (git-fixes).\n- dm: do not lock fs when the map is NULL in process of resume (git-fixes).\n- dm: remove flush_scheduled_work() during local_exit() (git-fixes).\n- dm: send just one event on resize, not two (git-fixes).\n- dma: xilinx_dpdma: Fix locking (git-fixes).\n- dmaengine: idxd: Fix oops during rmmod on single-CPU platforms (git-fixes).\n- dmaengine: owl: fix register access functions (git-fixes).\n- dmaengine: tegra186: Fix residual calculation (git-fixes).\n- docs: Document the FAN_FS_ERROR event (stable-fixes).\n- drm-print: add drm_dbg_driver to improve namespace symmetry (stable-fixes).\n- drm/amd/display: Do not recursively call manual trigger programming (stable-fixes).\n- drm/amd/display: Fix nanosec stat overflow (stable-fixes).\n- drm/amd/display: fix disable otg wa logic in DCN316 (stable-fixes).\n- drm/amd/pm: fixes a random hang in S4 for SMU v13.0.4/11 (stable-fixes).\n- drm/amdgpu/sdma5.2: use legacy HDP flush for SDMA2/3 (stable-fixes).\n- drm/amdgpu: Fix leak when GPU memory allocation fails (stable-fixes).\n- drm/amdgpu: Reset dGPU if suspend got aborted (stable-fixes).\n- drm/amdgpu: always force full reset for SOC21 (stable-fixes).\n- drm/amdgpu: fix incorrect active rb bitmap for gfx11 (stable-fixes).\n- drm/amdgpu: fix incorrect number of active RBs for gfx11 (stable-fixes).\n- drm/amdgpu: once more fix the call oder in amdgpu_ttm_move() v2 (git-fixes).\n- drm/amdgpu: validate the parameters of bo mapping operations more clearly (git-fixes).\n- drm/amdkfd: Reset GPU on queue preemption failure (stable-fixes).\n- drm/ast: Fix soft lockup (git-fixes).\n- drm/client: Fully protect modes[] with dev-\u003emode_config.mutex (stable-fixes).\n- drm/i915/cdclk: Fix CDCLK programming order when pipes are active (git-fixes).\n- drm/i915/vrr: Disable VRR when using bigjoiner (stable-fixes).\n- drm/i915: Disable port sync when bigjoiner is used (stable-fixes).\n- drm/msm/dp: fix typo in dp_display_handle_port_status_changed() (git-fixes).\n- drm/nouveau/nvkm: add a replacement for nvkm_notify (bsc#1223834)\n- drm/panel: ili9341: Respect deferred probe (git-fixes).\n- drm/panel: ili9341: Use predefined error codes (git-fixes).\n- drm/panel: visionox-rm69299: do not unregister DSI device (git-fixes).\n- drm/vc4: do not check if plane-\u003estate-\u003efb == state-\u003efb (stable-fixes).\n- drm/vmwgfx: Enable DMA mappings with SEV (git-fixes).\n- drm/vmwgfx: Fix crtc\u0027s atomic check conditional (git-fixes).\n- drm/vmwgfx: Fix invalid reads in fence signaled events (git-fixes).\n- drm/vmwgfx: Sort primary plane formats by order of preference (git-fixes).\n- drm: nv04: Fix out of bounds access (git-fixes).\n- drm: panel-orientation-quirks: Add quirk for GPD Win Mini (stable-fixes).\n- drm: panel-orientation-quirks: Add quirk for Lenovo Legion Go (stable-fixes).\n- dump_stack: Do not get cpu_sync for panic CPU (bsc#1223574).\n- fbdev: fix incorrect address computation in deferred IO (git-fixes).\n- fbdev: viafb: fix typo in hw_bitblt_1 and hw_bitblt_2 (stable-fixes).\n- fbmon: prevent division by zero in fb_videomode_from_videomode() (stable-fixes).\n- fix build warning\n- fuse: do not unhash root (bsc#1223951).\n- fuse: fix root lookup with nonzero generation (bsc#1223950).\n- hwmon: (amc6821) add of_match table (stable-fixes).\n- i2c: pxa: hide unused icr_bits[] variable (git-fixes).\n- i2c: smbus: fix NULL function pointer dereference (git-fixes).\n- i40e: Fix VF MAC filter removal (git-fixes).\n- idma64: Do not try to serve interrupts when device is powered off (git-fixes).\n- iio: accel: mxc4005: Interrupt handling fixes (git-fixes).\n- iio:imu: adis16475: Fix sync mode setting (git-fixes).\n- init/main.c: Fix potential static_command_line memory overflow (git-fixes).\n- iommu/amd: Add a length limitation for the ivrs_acpihid command-line parameter (git-fixes).\n- iommu/amd: Do not block updates to GATag if guest mode is on (git-fixes).\n- iommu/amd: Fix \u0027Guest Virtual APIC Table Root Pointer\u0027 configuration in IRTE (git-fixes).\n- iommu/amd: Fix domain flush size when syncing iotlb (git-fixes).\n- iommu/amd: Fix error handling for pdev_pri_ats_enable() (git-fixes).\n- iommu/arm-smmu-qcom: Limit the SMR groups to 128 (git-fixes).\n- iommu/arm-smmu-v3: Acknowledge pri/event queue overflow if any (git-fixes).\n- iommu/arm-smmu-v3: Work around MMU-600 erratum 1076982 (git-fixes).\n- iommu/fsl: fix all kernel-doc warnings in fsl_pamu.c (git-fixes).\n- iommu/iova: Fix alloc iova overflows issue (git-fixes).\n- iommu/mediatek: Flush IOTLB completely only if domain has been attached (git-fixes).\n- iommu/rockchip: Fix unwind goto issue (git-fixes).\n- iommu/sprd: Release dma buffer to avoid memory leak (git-fixes).\n- iommu/vt-d: Allocate local memory for page request queue (git-fixes).\n- iommu/vt-d: Allow zero SAGAW if second-stage not supported (git-fixes).\n- iommu/vt-d: Fix error handling in sva enable/disable paths (git-fixes).\n- iommu: Fix error unwind in iommu_group_alloc() (git-fixes).\n- ipv6/addrconf: fix a potential refcount underflow for idev (git-fixes).\n- kABI: Adjust trace_iterator.wait_index (git-fixes).\n- kprobes: Fix double free of kretprobe_holder (bsc#1220901).\n- kprobes: Fix possible use-after-free issue on kprobe registration (git-fixes).\n- libnvdimm/of_pmem: Use devm_kstrdup instead of kstrdup and check its return value (git-fixes).\n- libnvdimm/region: Allow setting align attribute on regions without mappings (git-fixes).\n- livepatch: Fix missing newline character in klp_resolve_symbols() (bsc#1223539).\n- md/raid1: fix choose next idle in read_balance() (git-fixes).\n- md: Do not clear MD_CLOSING when the raid is about to stop (git-fixes).\n- md: do not clear MD_RECOVERY_FROZEN for new dm-raid until resume (git-fixes).\n- media: cec: core: remove length check of Timer Status (stable-fixes).\n- media: sta2x11: fix irq handler cast (stable-fixes).\n- mei: me: add arrow lake point H DID (stable-fixes).\n- mei: me: add arrow lake point S DID (stable-fixes).\n- mei: me: disable RPL-S on SPS and IGN firmwares (git-fixes).\n- mm/vmscan: make sure wakeup_kswapd with managed zone (bsc#1223473).\n- mmc: sdhci-msm: pervent access to suspended controller (git-fixes).\n- mtd: diskonchip: work around ubsan link failure (stable-fixes).\n- nd_btt: Make BTT lanes preemptible (git-fixes).\n- net: bridge: vlan: fix memory leak in __allowed_ingress (git-fixes).\n- net: fix a memleak when uncloning an skb dst and its metadata (git-fixes).\n- net: fix skb leak in __skb_tstamp_tx() (git-fixes).\n- net: ipv6: ensure we call ipv6_mc_down() at most once (git-fixes).\n- net: mld: fix reference count leak in mld_{query | report}_work() (git-fixes).\n- net: stream: purge sk_error_queue in sk_stream_kill_queues() (git-fixes).\n- net: usb: ax88179_178a: avoid the interface always configured as random address (git-fixes).\n- net: usb: ax88179_178a: avoid writing the mac address before first reading (git-fixes).\n- net: usb: ax88179_178a: stop lying about skb-\u003etruesize (git-fixes).\n- net: vlan: fix underflow for the real_dev refcnt (git-fixes).\n- netfilter: br_netfilter: Drop dst references before setting (git-fixes).\n- netfilter: ipt_CLUSTERIP: fix refcount leak in clusterip_tg_check() (git-fixes).\n- netfilter: nft_ct: fix l3num expectations with inet pseudo family (git-fixes).\n- nfsd: Fixed mount issue with KOTD (bsc#1223380 bsc#1217408 bsc#1223640).\n- nfsd: use __fput_sync() to avoid delayed closing of files (bsc#1223380 bsc#1217408).\n- nilfs2: fix OOB in nilfs_set_de_type (git-fixes).\n- nilfs2: fix OOB in nilfs_set_de_type (git-fixes).\n- nouveau: fix function cast warning (git-fixes).\n- nouveau: fix instmem race condition around ptr stores (git-fixes).\n- nvdimm/namespace: drop nested variable in create_namespace_pmem() (git-fixes).\n- nvdimm: Allow overwrite in the presence of disabled dimms (git-fixes).\n- nvdimm: Fix badblocks clear off-by-one error (git-fixes).\n- nvdimm: Fix dereference after free in register_nvdimm_pmu() (git-fixes).\n- nvdimm: Fix firmware activation deadlock scenarios (git-fixes).\n- nvdimm: Fix memleak of pmu attr_groups in unregister_nvdimm_pmu() (git-fixes).\n- pci_iounmap(): Fix MMIO mapping leak (git-fixes).\n- phy: tegra: xusb: Add API to retrieve the port number of phy (stable-fixes).\n- pinctrl: renesas: checker: Limit cfg reg enum checks to provided IDs (stable-fixes).\n- platform/x86: intel-vbtn: Update tablet mode switch at end of probe (git-fixes).\n- platform/x86: touchscreen_dmi: Add an extra entry for a variant of the Chuwi Vi8 tablet (stable-fixes).\n- powerpc/kasan: Do not instrument non-maskable or raw interrupts (bsc#1223191).\n- powerpc/pseries/iommu: LPAR panics when rebooted with a frozen PE (bsc#1222011 ltc#205900).\n- powerpc/rtas: define pr_fmt and convert printk call sites (bsc#1223369 ltc#205888).\n- powerpc/rtas: export rtas_error_rc() for reuse (bsc#1223369 ltc#205888).\n- powerpc: Avoid nmi_enter/nmi_exit in real mode interrupt (bsc#1221645 ltc#205739 bsc#1223191).\n- powerpc: Refactor verification of MSR_RI (bsc#1223191).\n- printk: Add this_cpu_in_panic() (bsc#1223574).\n- printk: Adjust mapping for 32bit seq macros (bsc#1223574).\n- printk: Avoid non-panic CPUs writing to ringbuffer (bsc#1223574).\n- printk: Disable passing console lock owner completely during panic() (bsc#1223574).\n- printk: Drop console_sem during panic (bsc#1223574).\n- printk: Rename abandon_console_lock_in_panic() to other_cpu_in_panic() (bsc#1223574).\n- printk: Use prb_first_seq() as base for 32bit seq macros (bsc#1223574).\n- printk: Wait for all reserved records with pr_flush() (bsc#1223574).\n- printk: nbcon: Relocate 32bit seq macros (bsc#1223574).\n- printk: ringbuffer: Clarify special lpos values (bsc#1223574).\n- printk: ringbuffer: Cleanup reader terminology (bsc#1223574).\n- printk: ringbuffer: Do not skip non-finalized records with prb_next_seq() (bsc#1223574).\n- printk: ringbuffer: Improve prb_next_seq() performance (bsc#1223574).\n- printk: ringbuffer: Skip non-finalized records in panic (bsc#1223574).\n- pstore/zone: Add a null pointer check to the psz_kmsg_read (stable-fixes).\n- ring-buffer: Do not set shortest_full when full target is hit (git-fixes).\n- ring-buffer: Fix full_waiters_pending in poll (git-fixes).\n- ring-buffer: Fix resetting of shortest_full (git-fixes).\n- ring-buffer: Fix waking up ring buffer readers (git-fixes).\n- ring-buffer: Make wake once of ring_buffer_wait() more robust (git-fixes).\n- ring-buffer: Use wait_event_interruptible() in ring_buffer_wait() (git-fixes).\n- ring-buffer: use READ_ONCE() to read cpu_buffer-\u003ecommit_page in concurrent environment (git-fixes).\n- s390/cio: Ensure the copied buf is NUL terminated (git-fixes bsc#1223875).\n- s390/decompressor: fix misaligned symbol build error (git-fixes bsc#1223785).\n- s390/mm: Fix clearing storage keys for huge pages (git-fixes bsc#1223877).\n- s390/mm: Fix storage key clearing for guest huge pages (git-fixes bsc#1223878).\n- s390/qeth: Fix kernel panic after setting hsuid (git-fixes bsc#1223879).\n- s390/scm: fix virtual vs physical address confusion (git-fixes bsc#1223784).\n- s390/vdso: Add CFI for RA register to asm macro vdso_func (git-fixes bsc#1223876).\n- s390/vdso: drop \u0027-fPIC\u0027 from LDFLAGS (git-fixes bsc#1223598).\n- s390/zcrypt: fix reference counting on zcrypt card objects (git-fixes bsc#1223595).\n- s390: Fixed LPM of lpar failure with error HSCLA2CF in 19th loops (jsc#PED-542 git-fixes bsc#1213573 ltc#203238).\n- s390: Fixed kernel backtrack (bsc#1141539 git-fixes).\n- serial/pmac_zilog: Remove flawed mitigation for rx irq flood (git-fixes).\n- serial: core: Provide port lock wrappers (stable-fixes).\n- serial: core: fix kernel-doc for uart_port_unlock_irqrestore() (git-fixes).\n- serial: mxs-auart: add spinlock around changing cts state (git-fixes).\n- slimbus: qcom-ngd-ctrl: Add timeout for wait operation (git-fixes).\n- speakup: Avoid crash on very long word (git-fixes).\n- speakup: Fix 8bit characters from direct synth (git-fixes).\n- tcp/udp: Fix memleaks of sk and zerocopy skbs with TX timestamp (git-fixes).\n- thunderbolt: Avoid notify PM core about runtime PM resume (stable-fixes).\n- thunderbolt: Fix wake configurations after device unplug (stable-fixes).\n- tracing/net_sched: Fix tracepoints that save qdisc_dev() as a string (git-fixes).\n- tracing/ring-buffer: Fix wait_on_pipe() race (git-fixes).\n- tracing: Have saved_cmdlines arrays all in one allocation (git-fixes).\n- tracing: Remove precision vsnprintf() check from print event (git-fixes).\n- tracing: Show size of requested perf buffer (git-fixes).\n- tracing: Use .flush() call to wake up readers (git-fixes).\n- usb: Disable USB3 LPM at shutdown (stable-fixes).\n- usb: Fix regression caused by invalid ep0 maxpacket in virtual SuperSpeed device (git-fixes).\n- usb: dwc2: host: Fix dereference issue in DDMA completion flow (git-fixes).\n- usb: gadget: composite: fix OS descriptors w_value logic (git-fixes).\n- usb: gadget: f_fs: Fix a race condition when processing setup packets (git-fixes).\n- usb: gadget: f_ncm: Fix UAF ncm object at re-bind after usb ep transport error (stable-fixes).\n- usb: gadget: tegra-xudc: Fix USB3 PHY retrieval logic (git-fixes).\n- usb: ohci: Prevent missed ohci interrupts (git-fixes).\n- usb: sl811-hcd: only defined function checkdone if QUIRK2 is defined (stable-fixes).\n- usb: typec: tcpci: add generic tcpci fallback compatible (stable-fixes).\n- usb: typec: tcpm: Check for port partner validity before consuming it (git-fixes).\n- usb: typec: tcpm: unregister existing source caps before re-registration (bsc#1220569).\n- usb: typec: ucsi: Ack unsupported commands (stable-fixes).\n- usb: typec: ucsi: Clear UCSI_CCI_RESET_COMPLETE before reset (stable-fixes).\n- usb: typec: ucsi: Fix connector check on init (git-fixes).\n- usb: udc: remove warning when queue disabled ep (stable-fixes).\n- vdpa/mlx5: Allow CVQ size changes (git-fixes).\n- virtio: treat alloc_dax() -EOPNOTSUPP failure as non-fatal (bsc#1223949).\n- wifi: ath9k: fix LNA selection in ath_ant_try_scan() (stable-fixes).\n- wifi: iwlwifi: mvm: remove old PASN station when adding a new one (git-fixes).\n- wifi: iwlwifi: mvm: return uid from iwl_mvm_build_scan_cmd (git-fixes).\n- wifi: mac80211: check/clear fast rx for non-4addr sta VLAN changes (stable-fixes).\n- wifi: nl80211: do not free NULL coalescing rule (git-fixes).\n- x86/cpufeatures: Fix dependencies for GFNI, VAES, and VPCLMULQDQ (git-fixes).\n- x86/mm: Ensure input to pfn_to_kaddr() is treated as a 64-bit type (jsc#PED-7167 git-fixes).\n- x86/sev: Skip ROM range scans and validation for SEV-SNP guests (jsc#PED-7167 git-fixes).\n- x86/xen: Add some null pointer checking to smp.c (git-fixes).\n- x86/xen: add CPU dependencies for 32-bit build (git-fixes).\n- x86/xen: fix percpu vcpu_info allocation (git-fixes).\n- xen-netback: properly sync TX responses (git-fixes).\n- xen-netfront: Add missing skb_mark_for_recycle (git-fixes).\n- xen/gntdev: Fix the abuse of underlying struct page in DMA-buf import (git-fixes).\n- xen/xenbus: document will_handle argument for xenbus_watch_path() (git-fixes).\n- xfrm6: fix inet6_dev refcount underflow problem (git-fixes).\n",
        "title": "Description of the patch"
      },
      {
        "category": "details",
        "text": "SUSE-2024-1663,SUSE-SLE-Micro-5.5-2024-1663,SUSE-SLE-Module-Live-Patching-15-SP5-2024-1663,SUSE-SLE-Module-RT-15-SP5-2024-1663,openSUSE-SLE-15.5-2024-1663",
        "title": "Patchnames"
      },
      {
        "category": "legal_disclaimer",
        "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
        "title": "Terms of use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://www.suse.com/support/security/contact/",
      "name": "SUSE Product Security Team",
      "namespace": "https://www.suse.com/"
    },
    "references": [
      {
        "category": "external",
        "summary": "SUSE ratings",
        "url": "https://www.suse.com/support/security/rating/"
      },
      {
        "category": "self",
        "summary": "URL of this CSAF notice",
        "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2024_1663-1.json"
      },
      {
        "category": "self",
        "summary": "URL for SUSE-SU-2024:1663-1",
        "url": "https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/"
      },
      {
        "category": "self",
        "summary": "E-Mail link for SUSE-SU-2024:1663-1",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1141539",
        "url": "https://bugzilla.suse.com/1141539"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1177529",
        "url": "https://bugzilla.suse.com/1177529"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1190576",
        "url": "https://bugzilla.suse.com/1190576"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1192145",
        "url": "https://bugzilla.suse.com/1192145"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1192837",
        "url": "https://bugzilla.suse.com/1192837"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1193629",
        "url": "https://bugzilla.suse.com/1193629"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1196869",
        "url": "https://bugzilla.suse.com/1196869"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1200313",
        "url": "https://bugzilla.suse.com/1200313"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1201308",
        "url": "https://bugzilla.suse.com/1201308"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1201489",
        "url": "https://bugzilla.suse.com/1201489"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1203906",
        "url": "https://bugzilla.suse.com/1203906"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1203935",
        "url": "https://bugzilla.suse.com/1203935"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1204614",
        "url": "https://bugzilla.suse.com/1204614"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1207361",
        "url": "https://bugzilla.suse.com/1207361"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1211592",
        "url": "https://bugzilla.suse.com/1211592"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1213573",
        "url": "https://bugzilla.suse.com/1213573"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1217408",
        "url": "https://bugzilla.suse.com/1217408"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1218562",
        "url": "https://bugzilla.suse.com/1218562"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1218917",
        "url": "https://bugzilla.suse.com/1218917"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1219104",
        "url": "https://bugzilla.suse.com/1219104"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1219126",
        "url": "https://bugzilla.suse.com/1219126"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1219141",
        "url": "https://bugzilla.suse.com/1219141"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1219169",
        "url": "https://bugzilla.suse.com/1219169"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1219170",
        "url": "https://bugzilla.suse.com/1219170"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1219264",
        "url": "https://bugzilla.suse.com/1219264"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1220342",
        "url": "https://bugzilla.suse.com/1220342"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1220492",
        "url": "https://bugzilla.suse.com/1220492"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1220569",
        "url": "https://bugzilla.suse.com/1220569"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1220761",
        "url": "https://bugzilla.suse.com/1220761"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1220901",
        "url": "https://bugzilla.suse.com/1220901"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1220915",
        "url": "https://bugzilla.suse.com/1220915"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1220935",
        "url": "https://bugzilla.suse.com/1220935"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1221042",
        "url": "https://bugzilla.suse.com/1221042"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1221044",
        "url": "https://bugzilla.suse.com/1221044"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1221080",
        "url": "https://bugzilla.suse.com/1221080"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1221084",
        "url": "https://bugzilla.suse.com/1221084"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1221088",
        "url": "https://bugzilla.suse.com/1221088"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1221162",
        "url": "https://bugzilla.suse.com/1221162"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1221299",
        "url": "https://bugzilla.suse.com/1221299"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1221612",
        "url": "https://bugzilla.suse.com/1221612"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1221617",
        "url": "https://bugzilla.suse.com/1221617"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1221645",
        "url": "https://bugzilla.suse.com/1221645"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1221791",
        "url": "https://bugzilla.suse.com/1221791"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1221825",
        "url": "https://bugzilla.suse.com/1221825"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222011",
        "url": "https://bugzilla.suse.com/1222011"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222051",
        "url": "https://bugzilla.suse.com/1222051"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222247",
        "url": "https://bugzilla.suse.com/1222247"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222266",
        "url": "https://bugzilla.suse.com/1222266"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222294",
        "url": "https://bugzilla.suse.com/1222294"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222307",
        "url": "https://bugzilla.suse.com/1222307"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222357",
        "url": "https://bugzilla.suse.com/1222357"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222368",
        "url": "https://bugzilla.suse.com/1222368"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222379",
        "url": "https://bugzilla.suse.com/1222379"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222416",
        "url": "https://bugzilla.suse.com/1222416"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222422",
        "url": "https://bugzilla.suse.com/1222422"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222424",
        "url": "https://bugzilla.suse.com/1222424"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222427",
        "url": "https://bugzilla.suse.com/1222427"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222428",
        "url": "https://bugzilla.suse.com/1222428"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222430",
        "url": "https://bugzilla.suse.com/1222430"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222431",
        "url": "https://bugzilla.suse.com/1222431"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222435",
        "url": "https://bugzilla.suse.com/1222435"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222437",
        "url": "https://bugzilla.suse.com/1222437"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222445",
        "url": "https://bugzilla.suse.com/1222445"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222449",
        "url": "https://bugzilla.suse.com/1222449"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222482",
        "url": "https://bugzilla.suse.com/1222482"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222503",
        "url": "https://bugzilla.suse.com/1222503"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222520",
        "url": "https://bugzilla.suse.com/1222520"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222536",
        "url": "https://bugzilla.suse.com/1222536"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222549",
        "url": "https://bugzilla.suse.com/1222549"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222550",
        "url": "https://bugzilla.suse.com/1222550"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222557",
        "url": "https://bugzilla.suse.com/1222557"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222559",
        "url": "https://bugzilla.suse.com/1222559"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222585",
        "url": "https://bugzilla.suse.com/1222585"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222586",
        "url": "https://bugzilla.suse.com/1222586"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222596",
        "url": "https://bugzilla.suse.com/1222596"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222609",
        "url": "https://bugzilla.suse.com/1222609"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222610",
        "url": "https://bugzilla.suse.com/1222610"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222613",
        "url": "https://bugzilla.suse.com/1222613"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222615",
        "url": "https://bugzilla.suse.com/1222615"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222618",
        "url": "https://bugzilla.suse.com/1222618"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222624",
        "url": "https://bugzilla.suse.com/1222624"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222630",
        "url": "https://bugzilla.suse.com/1222630"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222632",
        "url": "https://bugzilla.suse.com/1222632"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222660",
        "url": "https://bugzilla.suse.com/1222660"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222662",
        "url": "https://bugzilla.suse.com/1222662"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222664",
        "url": "https://bugzilla.suse.com/1222664"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222666",
        "url": "https://bugzilla.suse.com/1222666"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222669",
        "url": "https://bugzilla.suse.com/1222669"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222671",
        "url": "https://bugzilla.suse.com/1222671"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222677",
        "url": "https://bugzilla.suse.com/1222677"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222678",
        "url": "https://bugzilla.suse.com/1222678"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222680",
        "url": "https://bugzilla.suse.com/1222680"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222703",
        "url": "https://bugzilla.suse.com/1222703"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222704",
        "url": "https://bugzilla.suse.com/1222704"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222706",
        "url": "https://bugzilla.suse.com/1222706"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222709",
        "url": "https://bugzilla.suse.com/1222709"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222710",
        "url": "https://bugzilla.suse.com/1222710"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222720",
        "url": "https://bugzilla.suse.com/1222720"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222721",
        "url": "https://bugzilla.suse.com/1222721"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222724",
        "url": "https://bugzilla.suse.com/1222724"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222726",
        "url": "https://bugzilla.suse.com/1222726"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222727",
        "url": "https://bugzilla.suse.com/1222727"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222764",
        "url": "https://bugzilla.suse.com/1222764"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222772",
        "url": "https://bugzilla.suse.com/1222772"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222773",
        "url": "https://bugzilla.suse.com/1222773"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222776",
        "url": "https://bugzilla.suse.com/1222776"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222781",
        "url": "https://bugzilla.suse.com/1222781"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222784",
        "url": "https://bugzilla.suse.com/1222784"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222785",
        "url": "https://bugzilla.suse.com/1222785"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222787",
        "url": "https://bugzilla.suse.com/1222787"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222790",
        "url": "https://bugzilla.suse.com/1222790"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222791",
        "url": "https://bugzilla.suse.com/1222791"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222792",
        "url": "https://bugzilla.suse.com/1222792"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222796",
        "url": "https://bugzilla.suse.com/1222796"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222798",
        "url": "https://bugzilla.suse.com/1222798"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222801",
        "url": "https://bugzilla.suse.com/1222801"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222812",
        "url": "https://bugzilla.suse.com/1222812"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222824",
        "url": "https://bugzilla.suse.com/1222824"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222829",
        "url": "https://bugzilla.suse.com/1222829"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222832",
        "url": "https://bugzilla.suse.com/1222832"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222836",
        "url": "https://bugzilla.suse.com/1222836"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222838",
        "url": "https://bugzilla.suse.com/1222838"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222866",
        "url": "https://bugzilla.suse.com/1222866"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222867",
        "url": "https://bugzilla.suse.com/1222867"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222869",
        "url": "https://bugzilla.suse.com/1222869"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222876",
        "url": "https://bugzilla.suse.com/1222876"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222878",
        "url": "https://bugzilla.suse.com/1222878"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222879",
        "url": "https://bugzilla.suse.com/1222879"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222881",
        "url": "https://bugzilla.suse.com/1222881"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222883",
        "url": "https://bugzilla.suse.com/1222883"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222888",
        "url": "https://bugzilla.suse.com/1222888"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222894",
        "url": "https://bugzilla.suse.com/1222894"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222901",
        "url": "https://bugzilla.suse.com/1222901"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222968",
        "url": "https://bugzilla.suse.com/1222968"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223012",
        "url": "https://bugzilla.suse.com/1223012"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223014",
        "url": "https://bugzilla.suse.com/1223014"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223016",
        "url": "https://bugzilla.suse.com/1223016"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223024",
        "url": "https://bugzilla.suse.com/1223024"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223030",
        "url": "https://bugzilla.suse.com/1223030"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223033",
        "url": "https://bugzilla.suse.com/1223033"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223034",
        "url": "https://bugzilla.suse.com/1223034"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223035",
        "url": "https://bugzilla.suse.com/1223035"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223036",
        "url": "https://bugzilla.suse.com/1223036"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223037",
        "url": "https://bugzilla.suse.com/1223037"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223041",
        "url": "https://bugzilla.suse.com/1223041"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223042",
        "url": "https://bugzilla.suse.com/1223042"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223051",
        "url": "https://bugzilla.suse.com/1223051"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223052",
        "url": "https://bugzilla.suse.com/1223052"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223056",
        "url": "https://bugzilla.suse.com/1223056"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223057",
        "url": "https://bugzilla.suse.com/1223057"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223058",
        "url": "https://bugzilla.suse.com/1223058"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223060",
        "url": "https://bugzilla.suse.com/1223060"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223061",
        "url": "https://bugzilla.suse.com/1223061"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223065",
        "url": "https://bugzilla.suse.com/1223065"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223066",
        "url": "https://bugzilla.suse.com/1223066"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223067",
        "url": "https://bugzilla.suse.com/1223067"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223068",
        "url": "https://bugzilla.suse.com/1223068"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223076",
        "url": "https://bugzilla.suse.com/1223076"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223078",
        "url": "https://bugzilla.suse.com/1223078"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223111",
        "url": "https://bugzilla.suse.com/1223111"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223115",
        "url": "https://bugzilla.suse.com/1223115"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223118",
        "url": "https://bugzilla.suse.com/1223118"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223187",
        "url": "https://bugzilla.suse.com/1223187"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223189",
        "url": "https://bugzilla.suse.com/1223189"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223190",
        "url": "https://bugzilla.suse.com/1223190"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223191",
        "url": "https://bugzilla.suse.com/1223191"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223196",
        "url": "https://bugzilla.suse.com/1223196"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223197",
        "url": "https://bugzilla.suse.com/1223197"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223198",
        "url": "https://bugzilla.suse.com/1223198"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223275",
        "url": "https://bugzilla.suse.com/1223275"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223323",
        "url": "https://bugzilla.suse.com/1223323"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223369",
        "url": "https://bugzilla.suse.com/1223369"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223380",
        "url": "https://bugzilla.suse.com/1223380"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223473",
        "url": "https://bugzilla.suse.com/1223473"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223474",
        "url": "https://bugzilla.suse.com/1223474"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223475",
        "url": "https://bugzilla.suse.com/1223475"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223477",
        "url": "https://bugzilla.suse.com/1223477"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223478",
        "url": "https://bugzilla.suse.com/1223478"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223479",
        "url": "https://bugzilla.suse.com/1223479"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223481",
        "url": "https://bugzilla.suse.com/1223481"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223482",
        "url": "https://bugzilla.suse.com/1223482"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223484",
        "url": "https://bugzilla.suse.com/1223484"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223487",
        "url": "https://bugzilla.suse.com/1223487"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223490",
        "url": "https://bugzilla.suse.com/1223490"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223496",
        "url": "https://bugzilla.suse.com/1223496"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223498",
        "url": "https://bugzilla.suse.com/1223498"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223499",
        "url": "https://bugzilla.suse.com/1223499"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223501",
        "url": "https://bugzilla.suse.com/1223501"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223502",
        "url": "https://bugzilla.suse.com/1223502"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223503",
        "url": "https://bugzilla.suse.com/1223503"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223505",
        "url": "https://bugzilla.suse.com/1223505"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223509",
        "url": "https://bugzilla.suse.com/1223509"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223511",
        "url": "https://bugzilla.suse.com/1223511"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223512",
        "url": "https://bugzilla.suse.com/1223512"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223513",
        "url": "https://bugzilla.suse.com/1223513"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223516",
        "url": "https://bugzilla.suse.com/1223516"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223517",
        "url": "https://bugzilla.suse.com/1223517"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223518",
        "url": "https://bugzilla.suse.com/1223518"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223519",
        "url": "https://bugzilla.suse.com/1223519"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223520",
        "url": "https://bugzilla.suse.com/1223520"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223522",
        "url": "https://bugzilla.suse.com/1223522"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223523",
        "url": "https://bugzilla.suse.com/1223523"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223525",
        "url": "https://bugzilla.suse.com/1223525"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223536",
        "url": "https://bugzilla.suse.com/1223536"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223539",
        "url": "https://bugzilla.suse.com/1223539"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223574",
        "url": "https://bugzilla.suse.com/1223574"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223595",
        "url": "https://bugzilla.suse.com/1223595"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223598",
        "url": "https://bugzilla.suse.com/1223598"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223634",
        "url": "https://bugzilla.suse.com/1223634"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223640",
        "url": "https://bugzilla.suse.com/1223640"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223643",
        "url": "https://bugzilla.suse.com/1223643"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223644",
        "url": "https://bugzilla.suse.com/1223644"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223645",
        "url": "https://bugzilla.suse.com/1223645"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223646",
        "url": "https://bugzilla.suse.com/1223646"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223648",
        "url": "https://bugzilla.suse.com/1223648"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223655",
        "url": "https://bugzilla.suse.com/1223655"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223657",
        "url": "https://bugzilla.suse.com/1223657"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223660",
        "url": "https://bugzilla.suse.com/1223660"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223661",
        "url": "https://bugzilla.suse.com/1223661"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223663",
        "url": "https://bugzilla.suse.com/1223663"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223664",
        "url": "https://bugzilla.suse.com/1223664"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223668",
        "url": "https://bugzilla.suse.com/1223668"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223686",
        "url": "https://bugzilla.suse.com/1223686"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223693",
        "url": "https://bugzilla.suse.com/1223693"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223705",
        "url": "https://bugzilla.suse.com/1223705"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223714",
        "url": "https://bugzilla.suse.com/1223714"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223735",
        "url": "https://bugzilla.suse.com/1223735"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223745",
        "url": "https://bugzilla.suse.com/1223745"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223784",
        "url": "https://bugzilla.suse.com/1223784"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223785",
        "url": "https://bugzilla.suse.com/1223785"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223790",
        "url": "https://bugzilla.suse.com/1223790"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223816",
        "url": "https://bugzilla.suse.com/1223816"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223821",
        "url": "https://bugzilla.suse.com/1223821"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223822",
        "url": "https://bugzilla.suse.com/1223822"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223824",
        "url": "https://bugzilla.suse.com/1223824"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223827",
        "url": "https://bugzilla.suse.com/1223827"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223834",
        "url": "https://bugzilla.suse.com/1223834"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223875",
        "url": "https://bugzilla.suse.com/1223875"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223876",
        "url": "https://bugzilla.suse.com/1223876"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223877",
        "url": "https://bugzilla.suse.com/1223877"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223878",
        "url": "https://bugzilla.suse.com/1223878"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223879",
        "url": "https://bugzilla.suse.com/1223879"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223894",
        "url": "https://bugzilla.suse.com/1223894"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223921",
        "url": "https://bugzilla.suse.com/1223921"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223922",
        "url": "https://bugzilla.suse.com/1223922"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223923",
        "url": "https://bugzilla.suse.com/1223923"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223924",
        "url": "https://bugzilla.suse.com/1223924"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223929",
        "url": "https://bugzilla.suse.com/1223929"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223931",
        "url": "https://bugzilla.suse.com/1223931"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223932",
        "url": "https://bugzilla.suse.com/1223932"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223934",
        "url": "https://bugzilla.suse.com/1223934"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223941",
        "url": "https://bugzilla.suse.com/1223941"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223948",
        "url": "https://bugzilla.suse.com/1223948"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223949",
        "url": "https://bugzilla.suse.com/1223949"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223950",
        "url": "https://bugzilla.suse.com/1223950"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223951",
        "url": "https://bugzilla.suse.com/1223951"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223952",
        "url": "https://bugzilla.suse.com/1223952"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223953",
        "url": "https://bugzilla.suse.com/1223953"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223956",
        "url": "https://bugzilla.suse.com/1223956"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223957",
        "url": "https://bugzilla.suse.com/1223957"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223960",
        "url": "https://bugzilla.suse.com/1223960"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223962",
        "url": "https://bugzilla.suse.com/1223962"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223963",
        "url": "https://bugzilla.suse.com/1223963"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223964",
        "url": "https://bugzilla.suse.com/1223964"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47047 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47047/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47181 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47181/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47182 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47182/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47183 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47183/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47184 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47184/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47185 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47185/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47187 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47187/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47188 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47188/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47189 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47189/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47191 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47191/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47192 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47192/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47193 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47193/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47194 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47194/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47195 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47195/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47196 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47196/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47197 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47197/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47198 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47198/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47199 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47199/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47200 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47200/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47201 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47201/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47202 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47202/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47203 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47203/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47204 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47204/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47205 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47205/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47206 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47206/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47207 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47207/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47209 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47209/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47210 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47210/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47211 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47211/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47212 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47212/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47214 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47214/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47215 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47215/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47216 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47216/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47217 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47217/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47218 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47218/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47219 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47219/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-48631 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-48631/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-48632 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-48632/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-48634 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-48634/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-48636 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-48636/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-48637 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-48637/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-48638 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-48638/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-48639 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-48639/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-48640 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-48640/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-48642 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-48642/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-48644 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-48644/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-48646 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-48646/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-48647 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-48647/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-48648 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-48648/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-48650 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-48650/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-48651 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-48651/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-48652 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-48652/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-48653 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-48653/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-48654 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-48654/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-48655 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-48655/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-48656 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-48656/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-48657 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-48657/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-48658 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-48658/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-48659 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-48659/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-48660 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-48660/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-48662 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-48662/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-48663 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-48663/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-48667 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-48667/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-48668 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-48668/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-48671 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-48671/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-48672 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-48672/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-48673 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-48673/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-48675 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-48675/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-48686 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-48686/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-48687 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-48687/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-48688 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-48688/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-48690 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-48690/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-48692 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-48692/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-48693 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-48693/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-48694 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-48694/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-48695 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-48695/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-48697 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-48697/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-48698 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-48698/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-48700 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-48700/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-48701 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-48701/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-48702 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-48702/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-48703 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-48703/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-48704 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-48704/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-2860 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-2860/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-52488 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-52488/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-52503 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-52503/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-52561 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-52561/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-52585 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-52585/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-52589 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-52589/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-52590 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-52590/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-52591 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-52591/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-52593 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-52593/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-52614 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-52614/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-52616 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-52616/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-52620 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-52620/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-52627 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-52627/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-52635 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-52635/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-52636 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-52636/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-52645 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-52645/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-52652 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-52652/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-6270 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-6270/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-0639 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-0639/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-0841 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-0841/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-22099 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-22099/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-23307 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-23307/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-23848 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-23848/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-23850 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-23850/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26601 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26601/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26610 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26610/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26656 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26656/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26660 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26660/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26671 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26671/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26673 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26673/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26675 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26675/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26680 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26680/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26681 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26681/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26684 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26684/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26685 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26685/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26687 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26687/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26688 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26688/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26689 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26689/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26696 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26696/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26697 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26697/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26702 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26702/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26704 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26704/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26718 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26718/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26722 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26722/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26727 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26727/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26733 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26733/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26736 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26736/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26737 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26737/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26739 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26739/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26743 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26743/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26744 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26744/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26745 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26745/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26747 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26747/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26749 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26749/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26751 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26751/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26754 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26754/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26760 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26760/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-267600 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-267600/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26763 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26763/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26764 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26764/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26766 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26766/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26769 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26769/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26771 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26771/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26772 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26772/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26773 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26773/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26776 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26776/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26779 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26779/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26783 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26783/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26787 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26787/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26790 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26790/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26792 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26792/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26793 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26793/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26798 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26798/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26805 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26805/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26807 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26807/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26816 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26816/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26817 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26817/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26820 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26820/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26825 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26825/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26830 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26830/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26833 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26833/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26836 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26836/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26843 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26843/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26848 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26848/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26852 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26852/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26853 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26853/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26855 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26855/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26856 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26856/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26857 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26857/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26861 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26861/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26862 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26862/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26866 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26866/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26872 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26872/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26875 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26875/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26878 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26878/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26879 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26879/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26881 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26881/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26882 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26882/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26883 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26883/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26884 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26884/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26885 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26885/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26891 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26891/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26893 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26893/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26895 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26895/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26896 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26896/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26897 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26897/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26898 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26898/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26901 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26901/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26903 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26903/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26917 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26917/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26927 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26927/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26948 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26948/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26950 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26950/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26951 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26951/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26955 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26955/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26956 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26956/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26960 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26960/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26965 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26965/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26966 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26966/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26969 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26969/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26970 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26970/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26972 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26972/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26981 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26981/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26982 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26982/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26993 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26993/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-27013 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-27013/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-27014 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-27014/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-27030 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-27030/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-27038 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-27038/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-27039 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-27039/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-27041 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-27041/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-27043 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-27043/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-27046 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-27046/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-27056 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-27056/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-27062 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-27062/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-27389 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-27389/"
      }
    ],
    "title": "Security update for the Linux Kernel",
    "tracking": {
      "current_release_date": "2024-05-15T19:08:39Z",
      "generator": {
        "date": "2024-05-15T19:08:39Z",
        "engine": {
          "name": "cve-database.git:bin/generate-csaf.pl",
          "version": "1"
        }
      },
      "id": "SUSE-SU-2024:1663-1",
      "initial_release_date": "2024-05-15T19:08:39Z",
      "revision_history": [
        {
          "date": "2024-05-15T19:08:39Z",
          "number": "1",
          "summary": "Current version"
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
                "product": {
                  "name": "kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
                  "product_id": "kernel-devel-rt-5.14.21-150500.13.52.1.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-source-rt-5.14.21-150500.13.52.1.noarch",
                "product": {
                  "name": "kernel-source-rt-5.14.21-150500.13.52.1.noarch",
                  "product_id": "kernel-source-rt-5.14.21-150500.13.52.1.noarch"
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
                "product": {
                  "name": "cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
                  "product_id": "cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
                "product": {
                  "name": "dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
                  "product_id": "dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
                "product": {
                  "name": "gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
                  "product_id": "gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
                "product": {
                  "name": "kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
                  "product_id": "kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-5.14.21-150500.13.52.1.x86_64",
                "product": {
                  "name": "kernel-rt-5.14.21-150500.13.52.1.x86_64",
                  "product_id": "kernel-rt-5.14.21-150500.13.52.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
                "product": {
                  "name": "kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
                  "product_id": "kernel-rt-devel-5.14.21-150500.13.52.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
                "product": {
                  "name": "kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
                  "product_id": "kernel-rt-extra-5.14.21-150500.13.52.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
                "product": {
                  "name": "kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
                  "product_id": "kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
                "product": {
                  "name": "kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
                  "product_id": "kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
                "product": {
                  "name": "kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
                  "product_id": "kernel-rt-optional-5.14.21-150500.13.52.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
                "product": {
                  "name": "kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
                  "product_id": "kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
                "product": {
                  "name": "kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
                  "product_id": "kernel-rt_debug-5.14.21-150500.13.52.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
                "product": {
                  "name": "kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
                  "product_id": "kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
                "product": {
                  "name": "kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
                  "product_id": "kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
                "product": {
                  "name": "kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
                  "product_id": "kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
                "product": {
                  "name": "kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
                  "product_id": "kernel-syms-rt-5.14.21-150500.13.52.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
                "product": {
                  "name": "kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
                  "product_id": "kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
                "product": {
                  "name": "ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
                  "product_id": "ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64",
                "product": {
                  "name": "reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64",
                  "product_id": "reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Micro 5.5",
                "product": {
                  "name": "SUSE Linux Enterprise Micro 5.5",
                  "product_id": "SUSE Linux Enterprise Micro 5.5",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-micro:5.5"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Live Patching 15 SP5",
                "product": {
                  "name": "SUSE Linux Enterprise Live Patching 15 SP5",
                  "product_id": "SUSE Linux Enterprise Live Patching 15 SP5",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-module-live-patching:15:sp5"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Real Time Module 15 SP5",
                "product": {
                  "name": "SUSE Real Time Module 15 SP5",
                  "product_id": "SUSE Real Time Module 15 SP5",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-module-rt:15:sp5"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "openSUSE Leap 15.5",
                "product": {
                  "name": "openSUSE Leap 15.5",
                  "product_id": "openSUSE Leap 15.5",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:opensuse:leap:15.5"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "SUSE Linux Enterprise"
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-5.14.21-150500.13.52.1.x86_64 as component of SUSE Linux Enterprise Micro 5.5",
          "product_id": "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64"
        },
        "product_reference": "kernel-rt-5.14.21-150500.13.52.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-rt-5.14.21-150500.13.52.1.noarch as component of SUSE Linux Enterprise Micro 5.5",
          "product_id": "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch"
        },
        "product_reference": "kernel-source-rt-5.14.21-150500.13.52.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64"
        },
        "product_reference": "kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64 as component of SUSE Real Time Module 15 SP5",
          "product_id": "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        },
        "product_reference": "cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
        "relates_to_product_reference": "SUSE Real Time Module 15 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64 as component of SUSE Real Time Module 15 SP5",
          "product_id": "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        },
        "product_reference": "dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
        "relates_to_product_reference": "SUSE Real Time Module 15 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64 as component of SUSE Real Time Module 15 SP5",
          "product_id": "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        },
        "product_reference": "gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
        "relates_to_product_reference": "SUSE Real Time Module 15 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-rt-5.14.21-150500.13.52.1.noarch as component of SUSE Real Time Module 15 SP5",
          "product_id": "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch"
        },
        "product_reference": "kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
        "relates_to_product_reference": "SUSE Real Time Module 15 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-5.14.21-150500.13.52.1.x86_64 as component of SUSE Real Time Module 15 SP5",
          "product_id": "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64"
        },
        "product_reference": "kernel-rt-5.14.21-150500.13.52.1.x86_64",
        "relates_to_product_reference": "SUSE Real Time Module 15 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-devel-5.14.21-150500.13.52.1.x86_64 as component of SUSE Real Time Module 15 SP5",
          "product_id": "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64"
        },
        "product_reference": "kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
        "relates_to_product_reference": "SUSE Real Time Module 15 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64 as component of SUSE Real Time Module 15 SP5",
          "product_id": "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64"
        },
        "product_reference": "kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
        "relates_to_product_reference": "SUSE Real Time Module 15 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt_debug-5.14.21-150500.13.52.1.x86_64 as component of SUSE Real Time Module 15 SP5",
          "product_id": "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64"
        },
        "product_reference": "kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
        "relates_to_product_reference": "SUSE Real Time Module 15 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64 as component of SUSE Real Time Module 15 SP5",
          "product_id": "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64"
        },
        "product_reference": "kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
        "relates_to_product_reference": "SUSE Real Time Module 15 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64 as component of SUSE Real Time Module 15 SP5",
          "product_id": "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64"
        },
        "product_reference": "kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
        "relates_to_product_reference": "SUSE Real Time Module 15 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-rt-5.14.21-150500.13.52.1.noarch as component of SUSE Real Time Module 15 SP5",
          "product_id": "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch"
        },
        "product_reference": "kernel-source-rt-5.14.21-150500.13.52.1.noarch",
        "relates_to_product_reference": "SUSE Real Time Module 15 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-rt-5.14.21-150500.13.52.1.x86_64 as component of SUSE Real Time Module 15 SP5",
          "product_id": "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64"
        },
        "product_reference": "kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
        "relates_to_product_reference": "SUSE Real Time Module 15 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64 as component of SUSE Real Time Module 15 SP5",
          "product_id": "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        },
        "product_reference": "ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
        "relates_to_product_reference": "SUSE Real Time Module 15 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        },
        "product_reference": "cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        },
        "product_reference": "dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        },
        "product_reference": "gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-rt-5.14.21-150500.13.52.1.noarch as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch"
        },
        "product_reference": "kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-5.14.21-150500.13.52.1.x86_64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64"
        },
        "product_reference": "kernel-rt-5.14.21-150500.13.52.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-devel-5.14.21-150500.13.52.1.x86_64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64"
        },
        "product_reference": "kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-extra-5.14.21-150500.13.52.1.x86_64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64"
        },
        "product_reference": "kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64"
        },
        "product_reference": "kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64"
        },
        "product_reference": "kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-optional-5.14.21-150500.13.52.1.x86_64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64"
        },
        "product_reference": "kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64"
        },
        "product_reference": "kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt_debug-5.14.21-150500.13.52.1.x86_64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64"
        },
        "product_reference": "kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64"
        },
        "product_reference": "kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64"
        },
        "product_reference": "kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64"
        },
        "product_reference": "kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-rt-5.14.21-150500.13.52.1.noarch as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch"
        },
        "product_reference": "kernel-source-rt-5.14.21-150500.13.52.1.noarch",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-rt-5.14.21-150500.13.52.1.x86_64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64"
        },
        "product_reference": "kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        },
        "product_reference": "kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        },
        "product_reference": "ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        },
        "product_reference": "reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2021-47047",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47047"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nspi: spi-zynqmp-gqspi: return -ENOMEM if dma_map_single fails\n\nThe spi controller supports 44-bit address space on AXI in DMA mode,\nso set dma_addr_t width to 44-bit to avoid using a swiotlb mapping.\nIn addition, if dma_map_single fails, it should return immediately\ninstead of continuing doing the DMA operation which bases on invalid\naddress.\n\nThis fixes the following crash which occurs in reading a big block\nfrom flash:\n\n[  123.633577] zynqmp-qspi ff0f0000.spi: swiotlb buffer is full (sz: 4194304 bytes), total 32768 (slots), used 0 (slots)\n[  123.644230] zynqmp-qspi ff0f0000.spi: ERR:rxdma:memory not mapped\n[  123.784625] Unable to handle kernel paging request at virtual address 00000000003fffc0\n[  123.792536] Mem abort info:\n[  123.795313]   ESR = 0x96000145\n[  123.798351]   EC = 0x25: DABT (current EL), IL = 32 bits\n[  123.803655]   SET = 0, FnV = 0\n[  123.806693]   EA = 0, S1PTW = 0\n[  123.809818] Data abort info:\n[  123.812683]   ISV = 0, ISS = 0x00000145\n[  123.816503]   CM = 1, WnR = 1\n[  123.819455] user pgtable: 4k pages, 48-bit VAs, pgdp=0000000805047000\n[  123.825887] [00000000003fffc0] pgd=0000000803b45003, p4d=0000000803b45003, pud=0000000000000000\n[  123.834586] Internal error: Oops: 96000145 [#1] PREEMPT SMP",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47047",
          "url": "https://www.suse.com/security/cve/CVE-2021-47047"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1220761 for CVE-2021-47047",
          "url": "https://bugzilla.suse.com/1220761"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.6,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47047"
    },
    {
      "cve": "CVE-2021-47181",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47181"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: musb: tusb6010: check return value after calling platform_get_resource()\n\nIt will cause null-ptr-deref if platform_get_resource() returns NULL,\nwe need check the return value.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47181",
          "url": "https://www.suse.com/security/cve/CVE-2021-47181"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222660 for CVE-2021-47181",
          "url": "https://bugzilla.suse.com/1222660"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47181"
    },
    {
      "cve": "CVE-2021-47182",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47182"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: core: Fix scsi_mode_sense() buffer length handling\n\nSeveral problems exist with scsi_mode_sense() buffer length handling:\n\n 1) The allocation length field of the MODE SENSE(10) command is 16-bits,\n    occupying bytes 7 and 8 of the CDB. With this command, access to mode\n    pages larger than 255 bytes is thus possible. However, the CDB\n    allocation length field is set by assigning len to byte 8 only, thus\n    truncating buffer length larger than 255.\n\n 2) If scsi_mode_sense() is called with len smaller than 8 with\n    sdev-\u003euse_10_for_ms set, or smaller than 4 otherwise, the buffer length\n    is increased to 8 and 4 respectively, and the buffer is zero filled\n    with these increased values, thus corrupting the memory following the\n    buffer.\n\nFix these 2 problems by using put_unaligned_be16() to set the allocation\nlength field of MODE SENSE(10) CDB and by returning an error when len is\ntoo small.\n\nFurthermore, if len is larger than 255B, always try MODE SENSE(10) first,\neven if the device driver did not set sdev-\u003euse_10_for_ms. In case of\ninvalid opcode error for MODE SENSE(10), access to mode pages larger than\n255 bytes are not retried using MODE SENSE(6). To avoid buffer length\noverflows for the MODE_SENSE(10) case, check that len is smaller than 65535\nbytes.\n\nWhile at it, also fix the folowing:\n\n * Use get_unaligned_be16() to retrieve the mode data length and block\n   descriptor length fields of the mode sense reply header instead of using\n   an open coded calculation.\n\n * Fix the kdoc dbd argument explanation: the DBD bit stands for Disable\n   Block Descriptor, which is the opposite of what the dbd argument\n   description was.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47182",
          "url": "https://www.suse.com/security/cve/CVE-2021-47182"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222662 for CVE-2021-47182",
          "url": "https://bugzilla.suse.com/1222662"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47182"
    },
    {
      "cve": "CVE-2021-47183",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47183"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: lpfc: Fix link down processing to address NULL pointer dereference\n\nIf an FC link down transition while PLOGIs are outstanding to fabric well\nknown addresses, outstanding ABTS requests may result in a NULL pointer\ndereference. Driver unload requests may hang with repeated \"2878\" log\nmessages.\n\nThe Link down processing results in ABTS requests for outstanding ELS\nrequests. The Abort WQEs are sent for the ELSs before the driver had set\nthe link state to down. Thus the driver is sending the Abort with the\nexpectation that an ABTS will be sent on the wire. The Abort request is\nstalled waiting for the link to come up. In some conditions the driver may\nauto-complete the ELSs thus if the link does come up, the Abort completions\nmay reference an invalid structure.\n\nFix by ensuring that Abort set the flag to avoid link traffic if issued due\nto conditions where the link failed.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47183",
          "url": "https://www.suse.com/security/cve/CVE-2021-47183"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222664 for CVE-2021-47183",
          "url": "https://bugzilla.suse.com/1222664"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47183"
    },
    {
      "cve": "CVE-2021-47184",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47184"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ni40e: Fix NULL ptr dereference on VSI filter sync\n\nRemove the reason of null pointer dereference in sync VSI filters.\nAdded new I40E_VSI_RELEASING flag to signalize deleting and releasing\nof VSI resources to sync this thread with sync filters subtask.\nWithout this patch it is possible to start update the VSI filter list\nafter VSI is removed, that\u0027s causing a kernel oops.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47184",
          "url": "https://www.suse.com/security/cve/CVE-2021-47184"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222666 for CVE-2021-47184",
          "url": "https://bugzilla.suse.com/1222666"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47184"
    },
    {
      "cve": "CVE-2021-47185",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47185"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntty: tty_buffer: Fix the softlockup issue in flush_to_ldisc\n\nWhen running ltp testcase(ltp/testcases/kernel/pty/pty04.c) with arm64, there is a soft lockup,\nwhich look like this one:\n\n  Workqueue: events_unbound flush_to_ldisc\n  Call trace:\n   dump_backtrace+0x0/0x1ec\n   show_stack+0x24/0x30\n   dump_stack+0xd0/0x128\n   panic+0x15c/0x374\n   watchdog_timer_fn+0x2b8/0x304\n   __run_hrtimer+0x88/0x2c0\n   __hrtimer_run_queues+0xa4/0x120\n   hrtimer_interrupt+0xfc/0x270\n   arch_timer_handler_phys+0x40/0x50\n   handle_percpu_devid_irq+0x94/0x220\n   __handle_domain_irq+0x88/0xf0\n   gic_handle_irq+0x84/0xfc\n   el1_irq+0xc8/0x180\n   slip_unesc+0x80/0x214 [slip]\n   tty_ldisc_receive_buf+0x64/0x80\n   tty_port_default_receive_buf+0x50/0x90\n   flush_to_ldisc+0xbc/0x110\n   process_one_work+0x1d4/0x4b0\n   worker_thread+0x180/0x430\n   kthread+0x11c/0x120\n\nIn the testcase pty04, The first process call the write syscall to send\ndata to the pty master. At the same time, the workqueue will do the\nflush_to_ldisc to pop data in a loop until there is no more data left.\nWhen the sender and workqueue running in different core, the sender sends\ndata fastly in full time which will result in workqueue doing work in loop\nfor a long time and occuring softlockup in flush_to_ldisc with kernel\nconfigured without preempt. So I add need_resched check and cond_resched\nin the flush_to_ldisc loop to avoid it.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47185",
          "url": "https://www.suse.com/security/cve/CVE-2021-47185"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222669 for CVE-2021-47185",
          "url": "https://bugzilla.suse.com/1222669"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47185"
    },
    {
      "cve": "CVE-2021-47187",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47187"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\narm64: dts: qcom: msm8998: Fix CPU/L2 idle state latency and residency\n\nThe entry/exit latency and minimum residency in state for the idle\nstates of MSM8998 were ..bad: first of all, for all of them the\ntimings were written for CPU sleep but the min-residency-us param\nwas miscalculated (supposedly, while porting this from downstream);\nThen, the power collapse states are setting PC on both the CPU\ncluster *and* the L2 cache, which have different timings: in the\nspecific case of L2 the times are higher so these ones should be\ntaken into account instead of the CPU ones.\n\nThis parameter misconfiguration was not giving particular issues\nbecause on MSM8998 there was no CPU scaling at all, so cluster/L2\npower collapse was rarely (if ever) hit.\nWhen CPU scaling is enabled, though, the wrong timings will produce\nSoC unstability shown to the user as random, apparently error-less,\nsudden reboots and/or lockups.\n\nThis set of parameters are stabilizing the SoC when CPU scaling is\nON and when power collapse is frequently hit.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47187",
          "url": "https://www.suse.com/security/cve/CVE-2021-47187"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222703 for CVE-2021-47187",
          "url": "https://bugzilla.suse.com/1222703"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47187"
    },
    {
      "cve": "CVE-2021-47188",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47188"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: ufs: core: Improve SCSI abort handling\n\nThe following has been observed on a test setup:\n\nWARNING: CPU: 4 PID: 250 at drivers/scsi/ufs/ufshcd.c:2737 ufshcd_queuecommand+0x468/0x65c\nCall trace:\n ufshcd_queuecommand+0x468/0x65c\n scsi_send_eh_cmnd+0x224/0x6a0\n scsi_eh_test_devices+0x248/0x418\n scsi_eh_ready_devs+0xc34/0xe58\n scsi_error_handler+0x204/0x80c\n kthread+0x150/0x1b4\n ret_from_fork+0x10/0x30\n\nThat warning is triggered by the following statement:\n\n\tWARN_ON(lrbp-\u003ecmd);\n\nFix this warning by clearing lrbp-\u003ecmd from the abort handler.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47188",
          "url": "https://www.suse.com/security/cve/CVE-2021-47188"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222671 for CVE-2021-47188",
          "url": "https://bugzilla.suse.com/1222671"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47188"
    },
    {
      "cve": "CVE-2021-47189",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47189"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: fix memory ordering between normal and ordered work functions\n\nOrdered work functions aren\u0027t guaranteed to be handled by the same thread\nwhich executed the normal work functions. The only way execution between\nnormal/ordered functions is synchronized is via the WORK_DONE_BIT,\nunfortunately the used bitops don\u0027t guarantee any ordering whatsoever.\n\nThis manifested as seemingly inexplicable crashes on ARM64, where\nasync_chunk::inode is seen as non-null in async_cow_submit which causes\nsubmit_compressed_extents to be called and crash occurs because\nasync_chunk::inode suddenly became NULL. The call trace was similar to:\n\n    pc : submit_compressed_extents+0x38/0x3d0\n    lr : async_cow_submit+0x50/0xd0\n    sp : ffff800015d4bc20\n\n    \u003cregisters omitted for brevity\u003e\n\n    Call trace:\n     submit_compressed_extents+0x38/0x3d0\n     async_cow_submit+0x50/0xd0\n     run_ordered_work+0xc8/0x280\n     btrfs_work_helper+0x98/0x250\n     process_one_work+0x1f0/0x4ac\n     worker_thread+0x188/0x504\n     kthread+0x110/0x114\n     ret_from_fork+0x10/0x18\n\nFix this by adding respective barrier calls which ensure that all\naccesses preceding setting of WORK_DONE_BIT are strictly ordered before\nsetting the flag. At the same time add a read barrier after reading of\nWORK_DONE_BIT in run_ordered_work which ensures all subsequent loads\nwould be strictly ordered after reading the bit. This in turn ensures\nare all accesses before WORK_DONE_BIT are going to be strictly ordered\nbefore any access that can occur in ordered_func.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47189",
          "url": "https://www.suse.com/security/cve/CVE-2021-47189"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222706 for CVE-2021-47189",
          "url": "https://bugzilla.suse.com/1222706"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47189"
    },
    {
      "cve": "CVE-2021-47191",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47191"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: scsi_debug: Fix out-of-bound read in resp_readcap16()\n\nThe following warning was observed running syzkaller:\n\n[ 3813.830724] sg_write: data in/out 65466/242 bytes for SCSI command 0x9e-- guessing data in;\n[ 3813.830724]    program syz-executor not setting count and/or reply_len properly\n[ 3813.836956] ==================================================================\n[ 3813.839465] BUG: KASAN: stack-out-of-bounds in sg_copy_buffer+0x157/0x1e0\n[ 3813.841773] Read of size 4096 at addr ffff8883cf80f540 by task syz-executor/1549\n[ 3813.846612] Call Trace:\n[ 3813.846995]  dump_stack+0x108/0x15f\n[ 3813.847524]  print_address_description+0xa5/0x372\n[ 3813.848243]  kasan_report.cold+0x236/0x2a8\n[ 3813.849439]  check_memory_region+0x240/0x270\n[ 3813.850094]  memcpy+0x30/0x80\n[ 3813.850553]  sg_copy_buffer+0x157/0x1e0\n[ 3813.853032]  sg_copy_from_buffer+0x13/0x20\n[ 3813.853660]  fill_from_dev_buffer+0x135/0x370\n[ 3813.854329]  resp_readcap16+0x1ac/0x280\n[ 3813.856917]  schedule_resp+0x41f/0x1630\n[ 3813.858203]  scsi_debug_queuecommand+0xb32/0x17e0\n[ 3813.862699]  scsi_dispatch_cmd+0x330/0x950\n[ 3813.863329]  scsi_request_fn+0xd8e/0x1710\n[ 3813.863946]  __blk_run_queue+0x10b/0x230\n[ 3813.864544]  blk_execute_rq_nowait+0x1d8/0x400\n[ 3813.865220]  sg_common_write.isra.0+0xe61/0x2420\n[ 3813.871637]  sg_write+0x6c8/0xef0\n[ 3813.878853]  __vfs_write+0xe4/0x800\n[ 3813.883487]  vfs_write+0x17b/0x530\n[ 3813.884008]  ksys_write+0x103/0x270\n[ 3813.886268]  __x64_sys_write+0x77/0xc0\n[ 3813.886841]  do_syscall_64+0x106/0x360\n[ 3813.887415]  entry_SYSCALL_64_after_hwframe+0x44/0xa9\n\nThis issue can be reproduced with the following syzkaller log:\n\nr0 = openat(0xffffffffffffff9c, \u0026(0x7f0000000040)=\u0027./file0\\x00\u0027, 0x26e1, 0x0)\nr1 = syz_open_procfs(0xffffffffffffffff, \u0026(0x7f0000000000)=\u0027fd/3\\x00\u0027)\nopen_by_handle_at(r1, \u0026(0x7f00000003c0)=ANY=[@ANYRESHEX], 0x602000)\nr2 = syz_open_dev$sg(\u0026(0x7f0000000000), 0x0, 0x40782)\nwrite$binfmt_aout(r2, \u0026(0x7f0000000340)=ANY=[@ANYBLOB=\"00000000deff000000000000000000000000000000000000000000000000000047f007af9e107a41ec395f1bded7be24277a1501ff6196a83366f4e6362bc0ff2b247f68a972989b094b2da4fb3607fcf611a22dd04310d28c75039d\"], 0x126)\n\nIn resp_readcap16() we get \"int alloc_len\" value -1104926854, and then pass\nthe huge arr_len to fill_from_dev_buffer(), but arr is only 32 bytes. This\nleads to OOB in sg_copy_buffer().\n\nTo solve this issue, define alloc_len as u32.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47191",
          "url": "https://www.suse.com/security/cve/CVE-2021-47191"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222866 for CVE-2021-47191",
          "url": "https://bugzilla.suse.com/1222866"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47191"
    },
    {
      "cve": "CVE-2021-47192",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47192"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: core: sysfs: Fix hang when device state is set via sysfs\n\nThis fixes a regression added with:\n\ncommit f0f82e2476f6 (\"scsi: core: Fix capacity set to zero after\nofflinining device\")\n\nThe problem is that after iSCSI recovery, iscsid will call into the kernel\nto set the dev\u0027s state to running, and with that patch we now call\nscsi_rescan_device() with the state_mutex held. If the SCSI error handler\nthread is just starting to test the device in scsi_send_eh_cmnd() then it\u0027s\ngoing to try to grab the state_mutex.\n\nWe are then stuck, because when scsi_rescan_device() tries to send its I/O\nscsi_queue_rq() calls -\u003e scsi_host_queue_ready() -\u003e scsi_host_in_recovery()\nwhich will return true (the host state is still in recovery) and I/O will\njust be requeued. scsi_send_eh_cmnd() will then never be able to grab the\nstate_mutex to finish error handling.\n\nTo prevent the deadlock move the rescan-related code to after we drop the\nstate_mutex.\n\nThis also adds a check for if we are already in the running state. This\nprevents extra scans and helps the iscsid case where if the transport class\nhas already onlined the device during its recovery process then we don\u0027t\nneed userspace to do it again plus possibly block that daemon.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47192",
          "url": "https://www.suse.com/security/cve/CVE-2021-47192"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222867 for CVE-2021-47192",
          "url": "https://bugzilla.suse.com/1222867"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47192"
    },
    {
      "cve": "CVE-2021-47193",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47193"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: pm80xx: Fix memory leak during rmmod\n\nDriver failed to release all memory allocated. This would lead to memory\nleak during driver removal.\n\nProperly free memory when the module is removed.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47193",
          "url": "https://www.suse.com/security/cve/CVE-2021-47193"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222879 for CVE-2021-47193",
          "url": "https://bugzilla.suse.com/1222879"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47193"
    },
    {
      "cve": "CVE-2021-47194",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47194"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncfg80211: call cfg80211_stop_ap when switch from P2P_GO type\n\nIf the userspace tools switch from NL80211_IFTYPE_P2P_GO to\nNL80211_IFTYPE_ADHOC via send_msg(NL80211_CMD_SET_INTERFACE), it\ndoes not call the cleanup cfg80211_stop_ap(), this leads to the\ninitialization of in-use data. For example, this path re-init the\nsdata-\u003eassigned_chanctx_list while it is still an element of\nassigned_vifs list, and makes that linked list corrupt.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47194",
          "url": "https://www.suse.com/security/cve/CVE-2021-47194"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222829 for CVE-2021-47194",
          "url": "https://bugzilla.suse.com/1222829"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47194"
    },
    {
      "cve": "CVE-2021-47195",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47195"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nspi: fix use-after-free of the add_lock mutex\n\nCommit 6098475d4cb4 (\"spi: Fix deadlock when adding SPI controllers on\nSPI buses\") introduced a per-controller mutex. But mutex_unlock() of\nsaid lock is called after the controller is already freed:\n\n  spi_unregister_controller(ctlr)\n  -\u003e put_device(\u0026ctlr-\u003edev)\n    -\u003e spi_controller_release(dev)\n  -\u003e mutex_unlock(\u0026ctrl-\u003eadd_lock)\n\nMove the put_device() after the mutex_unlock().",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47195",
          "url": "https://www.suse.com/security/cve/CVE-2021-47195"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222832 for CVE-2021-47195",
          "url": "https://bugzilla.suse.com/1222832"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47195"
    },
    {
      "cve": "CVE-2021-47196",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47196"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/core: Set send and receive CQ before forwarding to the driver\n\nPreset both receive and send CQ pointers prior to call to the drivers and\noverwrite it later again till the mlx4 is going to be changed do not\noverwrite ibqp properties.\n\nThis change is needed for mlx5, because in case of QP creation failure, it\nwill go to the path of QP destroy which relies on proper CQ pointers.\n\n BUG: KASAN: use-after-free in create_qp.cold+0x164/0x16e [mlx5_ib]\n Write of size 8 at addr ffff8880064c55c0 by task a.out/246\n\n CPU: 0 PID: 246 Comm: a.out Not tainted 5.15.0+ #291\n Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014\n Call Trace:\n  dump_stack_lvl+0x45/0x59\n  print_address_description.constprop.0+0x1f/0x140\n  kasan_report.cold+0x83/0xdf\n  create_qp.cold+0x164/0x16e [mlx5_ib]\n  mlx5_ib_create_qp+0x358/0x28a0 [mlx5_ib]\n  create_qp.part.0+0x45b/0x6a0 [ib_core]\n  ib_create_qp_user+0x97/0x150 [ib_core]\n  ib_uverbs_handler_UVERBS_METHOD_QP_CREATE+0x92c/0x1250 [ib_uverbs]\n  ib_uverbs_cmd_verbs+0x1c38/0x3150 [ib_uverbs]\n  ib_uverbs_ioctl+0x169/0x260 [ib_uverbs]\n  __x64_sys_ioctl+0x866/0x14d0\n  do_syscall_64+0x3d/0x90\n  entry_SYSCALL_64_after_hwframe+0x44/0xae\n\n Allocated by task 246:\n  kasan_save_stack+0x1b/0x40\n  __kasan_kmalloc+0xa4/0xd0\n  create_qp.part.0+0x92/0x6a0 [ib_core]\n  ib_create_qp_user+0x97/0x150 [ib_core]\n  ib_uverbs_handler_UVERBS_METHOD_QP_CREATE+0x92c/0x1250 [ib_uverbs]\n  ib_uverbs_cmd_verbs+0x1c38/0x3150 [ib_uverbs]\n  ib_uverbs_ioctl+0x169/0x260 [ib_uverbs]\n  __x64_sys_ioctl+0x866/0x14d0\n  do_syscall_64+0x3d/0x90\n  entry_SYSCALL_64_after_hwframe+0x44/0xae\n\n Freed by task 246:\n  kasan_save_stack+0x1b/0x40\n  kasan_set_track+0x1c/0x30\n  kasan_set_free_info+0x20/0x30\n  __kasan_slab_free+0x10c/0x150\n  slab_free_freelist_hook+0xb4/0x1b0\n  kfree+0xe7/0x2a0\n  create_qp.part.0+0x52b/0x6a0 [ib_core]\n  ib_create_qp_user+0x97/0x150 [ib_core]\n  ib_uverbs_handler_UVERBS_METHOD_QP_CREATE+0x92c/0x1250 [ib_uverbs]\n  ib_uverbs_cmd_verbs+0x1c38/0x3150 [ib_uverbs]\n  ib_uverbs_ioctl+0x169/0x260 [ib_uverbs]\n  __x64_sys_ioctl+0x866/0x14d0\n  do_syscall_64+0x3d/0x90\n  entry_SYSCALL_64_after_hwframe+0x44/0xae",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47196",
          "url": "https://www.suse.com/security/cve/CVE-2021-47196"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222773 for CVE-2021-47196",
          "url": "https://bugzilla.suse.com/1222773"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47196"
    },
    {
      "cve": "CVE-2021-47197",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47197"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/mlx5e: nullify cq-\u003edbg pointer in mlx5_debug_cq_remove()\n\nPrior to this patch in case mlx5_core_destroy_cq() failed it proceeds\nto rest of destroy operations. mlx5_core_destroy_cq() could be called again\nby user and cause additional call of mlx5_debug_cq_remove().\ncq-\u003edbg was not nullify in previous call and cause the crash.\n\nFix it by nullify cq-\u003edbg pointer after removal.\n\nAlso proceed to destroy operations only if FW return 0\nfor MLX5_CMD_OP_DESTROY_CQ command.\n\ngeneral protection fault, probably for non-canonical address 0x2000300004058: 0000 [#1] SMP PTI\nCPU: 5 PID: 1228 Comm: python Not tainted 5.15.0-rc5_for_upstream_min_debug_2021_10_14_11_06 #1\nHardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014\nRIP: 0010:lockref_get+0x1/0x60\nCode: 5d e9 53 ff ff ff 48 8d 7f 70 e8 0a 2e 48 00 c7 85 d0 00 00 00 02\n00 00 00 c6 45 70 00 fb 5d c3 c3 cc cc cc cc cc cc cc cc 53 \u003c48\u003e 8b 17\n48 89 fb 85 d2 75 3d 48 89 d0 bf 64 00 00 00 48 89 c1 48\nRSP: 0018:ffff888137dd7a38 EFLAGS: 00010206\nRAX: 0000000000000000 RBX: ffff888107d5f458 RCX: 00000000fffffffe\nRDX: 000000000002c2b0 RSI: ffffffff8155e2e0 RDI: 0002000300004058\nRBP: ffff888137dd7a88 R08: 0002000300004058 R09: ffff8881144a9f88\nR10: 0000000000000000 R11: 0000000000000000 R12: ffff8881141d4000\nR13: ffff888137dd7c68 R14: ffff888137dd7d58 R15: ffff888137dd7cc0\nFS:  00007f4644f2a4c0(0000) GS:ffff8887a2d40000(0000)\nknlGS:0000000000000000\nCS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 000055b4500f4380 CR3: 0000000114f7a003 CR4: 0000000000170ea0\nCall Trace:\n  simple_recursive_removal+0x33/0x2e0\n  ? debugfs_remove+0x60/0x60\n  debugfs_remove+0x40/0x60\n  mlx5_debug_cq_remove+0x32/0x70 [mlx5_core]\n  mlx5_core_destroy_cq+0x41/0x1d0 [mlx5_core]\n  devx_obj_cleanup+0x151/0x330 [mlx5_ib]\n  ? __pollwait+0xd0/0xd0\n  ? xas_load+0x5/0x70\n  ? xa_load+0x62/0xa0\n  destroy_hw_idr_uobject+0x20/0x80 [ib_uverbs]\n  uverbs_destroy_uobject+0x3b/0x360 [ib_uverbs]\n  uobj_destroy+0x54/0xa0 [ib_uverbs]\n  ib_uverbs_cmd_verbs+0xaf2/0x1160 [ib_uverbs]\n  ? uverbs_finalize_object+0xd0/0xd0 [ib_uverbs]\n  ib_uverbs_ioctl+0xc4/0x1b0 [ib_uverbs]\n  __x64_sys_ioctl+0x3e4/0x8e0",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47197",
          "url": "https://www.suse.com/security/cve/CVE-2021-47197"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222776 for CVE-2021-47197",
          "url": "https://bugzilla.suse.com/1222776"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47197"
    },
    {
      "cve": "CVE-2021-47198",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47198"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: lpfc: Fix use-after-free in lpfc_unreg_rpi() routine\n\nAn error is detected with the following report when unloading the driver:\n  \"KASAN: use-after-free in lpfc_unreg_rpi+0x1b1b\"\n\nThe NLP_REG_LOGIN_SEND nlp_flag is set in lpfc_reg_fab_ctrl_node(), but the\nflag is not cleared upon completion of the login.\n\nThis allows a second call to lpfc_unreg_rpi() to proceed with nlp_rpi set\nto LPFC_RPI_ALLOW_ERROR.  This results in a use after free access when used\nas an rpi_ids array index.\n\nFix by clearing the NLP_REG_LOGIN_SEND nlp_flag in\nlpfc_mbx_cmpl_fc_reg_login().",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47198",
          "url": "https://www.suse.com/security/cve/CVE-2021-47198"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222883 for CVE-2021-47198",
          "url": "https://bugzilla.suse.com/1222883"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47198"
    },
    {
      "cve": "CVE-2021-47199",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47199"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/mlx5e: CT, Fix multiple allocations and memleak of mod acts\n\nCT clear action offload adds additional mod hdr actions to the\nflow\u0027s original mod actions in order to clear the registers which\nhold ct_state.\nWhen such flow also includes encap action, a neigh update event\ncan cause the driver to unoffload the flow and then reoffload it.\n\nEach time this happens, the ct clear handling adds that same set\nof mod hdr actions to reset ct_state until the max of mod hdr\nactions is reached.\n\nAlso the driver never releases the allocated mod hdr actions and\ncausing a memleak.\n\nFix above two issues by moving CT clear mod acts allocation\ninto the parsing actions phase and only use it when offloading the rule.\nThe release of mod acts will be done in the normal flow_put().\n\n backtrace:\n    [\u003c000000007316e2f3\u003e] krealloc+0x83/0xd0\n    [\u003c00000000ef157de1\u003e] mlx5e_mod_hdr_alloc+0x147/0x300 [mlx5_core]\n    [\u003c00000000970ce4ae\u003e] mlx5e_tc_match_to_reg_set_and_get_id+0xd7/0x240 [mlx5_core]\n    [\u003c0000000067c5fa17\u003e] mlx5e_tc_match_to_reg_set+0xa/0x20 [mlx5_core]\n    [\u003c00000000d032eb98\u003e] mlx5_tc_ct_entry_set_registers.isra.0+0x36/0xc0 [mlx5_core]\n    [\u003c00000000fd23b869\u003e] mlx5_tc_ct_flow_offload+0x272/0x1f10 [mlx5_core]\n    [\u003c000000004fc24acc\u003e] mlx5e_tc_offload_fdb_rules.part.0+0x150/0x620 [mlx5_core]\n    [\u003c00000000dc741c17\u003e] mlx5e_tc_encap_flows_add+0x489/0x690 [mlx5_core]\n    [\u003c00000000e92e49d7\u003e] mlx5e_rep_update_flows+0x6e4/0x9b0 [mlx5_core]\n    [\u003c00000000f60f5602\u003e] mlx5e_rep_neigh_update+0x39a/0x5d0 [mlx5_core]",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47199",
          "url": "https://www.suse.com/security/cve/CVE-2021-47199"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222785 for CVE-2021-47199",
          "url": "https://bugzilla.suse.com/1222785"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47199"
    },
    {
      "cve": "CVE-2021-47200",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47200"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/prime: Fix use after free in mmap with drm_gem_ttm_mmap\n\ndrm_gem_ttm_mmap() drops a reference to the gem object on success. If\nthe gem object\u0027s refcount == 1 on entry to drm_gem_prime_mmap(), that\ndrop will free the gem object, and the subsequent drm_gem_object_get()\nwill be a UAF. Fix by grabbing a reference before calling the mmap\nhelper.\n\nThis issue was forseen when the reference dropping was adding in\ncommit 9786b65bc61ac (\"drm/ttm: fix mmap refcounting\"):\n  \"For that to work properly the drm_gem_object_get() call in\n  drm_gem_ttm_mmap() must be moved so it happens before calling\n  obj-\u003efuncs-\u003emmap(), otherwise the gem refcount would go down\n  to zero.\"",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47200",
          "url": "https://www.suse.com/security/cve/CVE-2021-47200"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222838 for CVE-2021-47200",
          "url": "https://bugzilla.suse.com/1222838"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47200"
    },
    {
      "cve": "CVE-2021-47201",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47201"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\niavf: free q_vectors before queues in iavf_disable_vf\n\niavf_free_queues() clears adapter-\u003enum_active_queues, which\niavf_free_q_vectors() relies on, so swap the order of these two function\ncalls in iavf_disable_vf(). This resolves a panic encountered when the\ninterface is disabled and then later brought up again after PF\ncommunication is restored.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47201",
          "url": "https://www.suse.com/security/cve/CVE-2021-47201"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222792 for CVE-2021-47201",
          "url": "https://bugzilla.suse.com/1222792"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47201"
    },
    {
      "cve": "CVE-2021-47202",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47202"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nthermal: Fix NULL pointer dereferences in of_thermal_ functions\n\nof_parse_thermal_zones() parses the thermal-zones node and registers a\nthermal_zone device for each subnode. However, if a thermal zone is\nconsuming a thermal sensor and that thermal sensor device hasn\u0027t probed\nyet, an attempt to set trip_point_*_temp for that thermal zone device\ncan cause a NULL pointer dereference. Fix it.\n\n console:/sys/class/thermal/thermal_zone87 # echo 120000 \u003e trip_point_0_temp\n ...\n Unable to handle kernel NULL pointer dereference at virtual address 0000000000000020\n ...\n Call trace:\n  of_thermal_set_trip_temp+0x40/0xc4\n  trip_point_temp_store+0xc0/0x1dc\n  dev_attr_store+0x38/0x88\n  sysfs_kf_write+0x64/0xc0\n  kernfs_fop_write_iter+0x108/0x1d0\n  vfs_write+0x2f4/0x368\n  ksys_write+0x7c/0xec\n  __arm64_sys_write+0x20/0x30\n  el0_svc_common.llvm.7279915941325364641+0xbc/0x1bc\n  do_el0_svc+0x28/0xa0\n  el0_svc+0x14/0x24\n  el0_sync_handler+0x88/0xec\n  el0_sync+0x1c0/0x200\n\nWhile at it, fix the possible NULL pointer dereference in other\nfunctions as well: of_thermal_get_temp(), of_thermal_set_emul_temp(),\nof_thermal_get_trend().",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47202",
          "url": "https://www.suse.com/security/cve/CVE-2021-47202"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222878 for CVE-2021-47202",
          "url": "https://bugzilla.suse.com/1222878"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47202"
    },
    {
      "cve": "CVE-2021-47203",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47203"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: lpfc: Fix list_add() corruption in lpfc_drain_txq()\n\nWhen parsing the txq list in lpfc_drain_txq(), the driver attempts to pass\nthe requests to the adapter. If such an attempt fails, a local \"fail_msg\"\nstring is set and a log message output.  The job is then added to a\ncompletions list for cancellation.\n\nProcessing of any further jobs from the txq list continues, but since\n\"fail_msg\" remains set, jobs are added to the completions list regardless\nof whether a wqe was passed to the adapter.  If successfully added to\ntxcmplq, jobs are added to both lists resulting in list corruption.\n\nFix by clearing the fail_msg string after adding a job to the completions\nlist. This stops the subsequent jobs from being added to the completions\nlist unless they had an appropriate failure.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47203",
          "url": "https://www.suse.com/security/cve/CVE-2021-47203"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222881 for CVE-2021-47203",
          "url": "https://bugzilla.suse.com/1222881"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47203"
    },
    {
      "cve": "CVE-2021-47204",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47204"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: dpaa2-eth: fix use-after-free in dpaa2_eth_remove\n\nAccess to netdev after free_netdev() will cause use-after-free bug.\nMove debug log before free_netdev() call to avoid it.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47204",
          "url": "https://www.suse.com/security/cve/CVE-2021-47204"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222787 for CVE-2021-47204",
          "url": "https://bugzilla.suse.com/1222787"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47204"
    },
    {
      "cve": "CVE-2021-47205",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47205"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nclk: sunxi-ng: Unregister clocks/resets when unbinding\n\nCurrently, unbinding a CCU driver unmaps the device\u0027s MMIO region, while\nleaving its clocks/resets and their providers registered. This can cause\na page fault later when some clock operation tries to perform MMIO. Fix\nthis by separating the CCU initialization from the memory allocation,\nand then using a devres callback to unregister the clocks and resets.\n\nThis also fixes a memory leak of the `struct ccu_reset`, and uses the\ncorrect owner (the specific platform driver) for the clocks and resets.\n\nEarly OF clock providers are never unregistered, and limited error\nhandling is possible, so they are mostly unchanged. The error reporting\nis made more consistent by moving the message inside of_sunxi_ccu_probe.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47205",
          "url": "https://www.suse.com/security/cve/CVE-2021-47205"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222888 for CVE-2021-47205",
          "url": "https://bugzilla.suse.com/1222888"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47205"
    },
    {
      "cve": "CVE-2021-47206",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47206"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: host: ohci-tmio: check return value after calling platform_get_resource()\n\nIt will cause null-ptr-deref if platform_get_resource() returns NULL,\nwe need check the return value.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47206",
          "url": "https://www.suse.com/security/cve/CVE-2021-47206"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222894 for CVE-2021-47206",
          "url": "https://bugzilla.suse.com/1222894"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47206"
    },
    {
      "cve": "CVE-2021-47207",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47207"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: gus: fix null pointer dereference on pointer block\n\nThe pointer block return from snd_gf1_dma_next_block could be\nnull, so there is a potential null pointer dereference issue.\nFix this by adding a null check before dereference.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47207",
          "url": "https://www.suse.com/security/cve/CVE-2021-47207"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222790 for CVE-2021-47207",
          "url": "https://bugzilla.suse.com/1222790"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47207"
    },
    {
      "cve": "CVE-2021-47209",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47209"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsched/fair: Prevent dead task groups from regaining cfs_rq\u0027s\n\nKevin is reporting crashes which point to a use-after-free of a cfs_rq\nin update_blocked_averages(). Initial debugging revealed that we\u0027ve\nlive cfs_rq\u0027s (on_list=1) in an about to be kfree()\u0027d task group in\nfree_fair_sched_group(). However, it was unclear how that can happen.\n\nHis kernel config happened to lead to a layout of struct sched_entity\nthat put the \u0027my_q\u0027 member directly into the middle of the object\nwhich makes it incidentally overlap with SLUB\u0027s freelist pointer.\nThat, in combination with SLAB_FREELIST_HARDENED\u0027s freelist pointer\nmangling, leads to a reliable access violation in form of a #GP which\nmade the UAF fail fast.\n\nMichal seems to have run into the same issue[1]. He already correctly\ndiagnosed that commit a7b359fc6a37 (\"sched/fair: Correctly insert\ncfs_rq\u0027s to list on unthrottle\") is causing the preconditions for the\nUAF to happen by re-adding cfs_rq\u0027s also to task groups that have no\nmore running tasks, i.e. also to dead ones. His analysis, however,\nmisses the real root cause and it cannot be seen from the crash\nbacktrace only, as the real offender is tg_unthrottle_up() getting\ncalled via sched_cfs_period_timer() via the timer interrupt at an\ninconvenient time.\n\nWhen unregister_fair_sched_group() unlinks all cfs_rq\u0027s from the dying\ntask group, it doesn\u0027t protect itself from getting interrupted. If the\ntimer interrupt triggers while we iterate over all CPUs or after\nunregister_fair_sched_group() has finished but prior to unlinking the\ntask group, sched_cfs_period_timer() will execute and walk the list of\ntask groups, trying to unthrottle cfs_rq\u0027s, i.e. re-add them to the\ndying task group. These will later -- in free_fair_sched_group() -- be\nkfree()\u0027ed while still being linked, leading to the fireworks Kevin\nand Michal are seeing.\n\nTo fix this race, ensure the dying task group gets unlinked first.\nHowever, simply switching the order of unregistering and unlinking the\ntask group isn\u0027t sufficient, as concurrent RCU walkers might still see\nit, as can be seen below:\n\n    CPU1:                                      CPU2:\n      :                                        timer IRQ:\n      :                                          do_sched_cfs_period_timer():\n      :                                            :\n      :                                            distribute_cfs_runtime():\n      :                                              rcu_read_lock();\n      :                                              :\n      :                                              unthrottle_cfs_rq():\n    sched_offline_group():                             :\n      :                                                walk_tg_tree_from(\u2026,tg_unthrottle_up,\u2026):\n      list_del_rcu(\u0026tg-\u003elist);                           :\n (1)  :                                                  list_for_each_entry_rcu(child, \u0026parent-\u003echildren, siblings)\n      :                                                    :\n (2)  list_del_rcu(\u0026tg-\u003esiblings);                         :\n      :                                                    tg_unthrottle_up():\n      unregister_fair_sched_group():                         struct cfs_rq *cfs_rq = tg-\u003ecfs_rq[cpu_of(rq)];\n        :                                                    :\n        list_del_leaf_cfs_rq(tg-\u003ecfs_rq[cpu]);               :\n        :                                                    :\n        :                                                    if (!cfs_rq_is_decayed(cfs_rq) || cfs_rq-\u003enr_running)\n (3)    :                                                        list_add_leaf_cfs_rq(cfs_rq);\n      :                                                      :\n      :                                                    :\n      :                                                  :\n      :                                                :\n      :                           \n---truncated---",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47209",
          "url": "https://www.suse.com/security/cve/CVE-2021-47209"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222796 for CVE-2021-47209",
          "url": "https://bugzilla.suse.com/1222796"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47209"
    },
    {
      "cve": "CVE-2021-47210",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47210"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: typec: tipd: Remove WARN_ON in tps6598x_block_read\n\nCalling tps6598x_block_read with a higher than allowed len can be\nhandled by just returning an error. There\u0027s no need to crash systems\nwith panic-on-warn enabled.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47210",
          "url": "https://www.suse.com/security/cve/CVE-2021-47210"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222901 for CVE-2021-47210",
          "url": "https://bugzilla.suse.com/1222901"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47210"
    },
    {
      "cve": "CVE-2021-47211",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47211"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: usb-audio: fix null pointer dereference on pointer cs_desc\n\nThe pointer cs_desc return from snd_usb_find_clock_source could\nbe null, so there is a potential null pointer dereference issue.\nFix this by adding a null check before dereference.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47211",
          "url": "https://www.suse.com/security/cve/CVE-2021-47211"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222869 for CVE-2021-47211",
          "url": "https://bugzilla.suse.com/1222869"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47211"
    },
    {
      "cve": "CVE-2021-47212",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47212"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/mlx5: Update error handler for UCTX and UMEM\n\nIn the fast unload flow, the device state is set to internal error,\nwhich indicates that the driver started the destroy process.\nIn this case, when a destroy command is being executed, it should return\nMLX5_CMD_STAT_OK.\nFix MLX5_CMD_OP_DESTROY_UCTX and MLX5_CMD_OP_DESTROY_UMEM to return OK\ninstead of EIO.\n\nThis fixes a call trace in the umem release process -\n[ 2633.536695] Call Trace:\n[ 2633.537518]  ib_uverbs_remove_one+0xc3/0x140 [ib_uverbs]\n[ 2633.538596]  remove_client_context+0x8b/0xd0 [ib_core]\n[ 2633.539641]  disable_device+0x8c/0x130 [ib_core]\n[ 2633.540615]  __ib_unregister_device+0x35/0xa0 [ib_core]\n[ 2633.541640]  ib_unregister_device+0x21/0x30 [ib_core]\n[ 2633.542663]  __mlx5_ib_remove+0x38/0x90 [mlx5_ib]\n[ 2633.543640]  auxiliary_bus_remove+0x1e/0x30 [auxiliary]\n[ 2633.544661]  device_release_driver_internal+0x103/0x1f0\n[ 2633.545679]  bus_remove_device+0xf7/0x170\n[ 2633.546640]  device_del+0x181/0x410\n[ 2633.547606]  mlx5_rescan_drivers_locked.part.10+0x63/0x160 [mlx5_core]\n[ 2633.548777]  mlx5_unregister_device+0x27/0x40 [mlx5_core]\n[ 2633.549841]  mlx5_uninit_one+0x21/0xc0 [mlx5_core]\n[ 2633.550864]  remove_one+0x69/0xe0 [mlx5_core]\n[ 2633.551819]  pci_device_remove+0x3b/0xc0\n[ 2633.552731]  device_release_driver_internal+0x103/0x1f0\n[ 2633.553746]  unbind_store+0xf6/0x130\n[ 2633.554657]  kernfs_fop_write+0x116/0x190\n[ 2633.555567]  vfs_write+0xa5/0x1a0\n[ 2633.556407]  ksys_write+0x4f/0xb0\n[ 2633.557233]  do_syscall_64+0x5b/0x1a0\n[ 2633.558071]  entry_SYSCALL_64_after_hwframe+0x65/0xca\n[ 2633.559018] RIP: 0033:0x7f9977132648\n[ 2633.559821] Code: 89 02 48 c7 c0 ff ff ff ff eb b3 0f 1f 80 00 00 00 00 f3 0f 1e fa 48 8d 05 55 6f 2d 00 8b 00 85 c0 75 17 b8 01 00 00 00 0f 05 \u003c48\u003e 3d 00 f0 ff ff 77 58 c3 0f 1f 80 00 00 00 00 41 54 49 89 d4 55\n[ 2633.562332] RSP: 002b:00007fffb1a83888 EFLAGS: 00000246 ORIG_RAX: 0000000000000001\n[ 2633.563472] RAX: ffffffffffffffda RBX: 000000000000000c RCX: 00007f9977132648\n[ 2633.564541] RDX: 000000000000000c RSI: 000055b90546e230 RDI: 0000000000000001\n[ 2633.565596] RBP: 000055b90546e230 R08: 00007f9977406860 R09: 00007f9977a54740\n[ 2633.566653] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f99774056e0\n[ 2633.567692] R13: 000000000000000c R14: 00007f9977400880 R15: 000000000000000c\n[ 2633.568725] ---[ end trace 10b4fe52945e544d ]---",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47212",
          "url": "https://www.suse.com/security/cve/CVE-2021-47212"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222709 for CVE-2021-47212",
          "url": "https://bugzilla.suse.com/1222709"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47212"
    },
    {
      "cve": "CVE-2021-47214",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47214"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nhugetlb, userfaultfd: fix reservation restore on userfaultfd error\n\nCurrently in the is_continue case in hugetlb_mcopy_atomic_pte(), if we\nbail out using \"goto out_release_unlock;\" in the cases where idx \u003e=\nsize, or !huge_pte_none(), the code will detect that new_pagecache_page\n== false, and so call restore_reserve_on_error().  In this case I see\nrestore_reserve_on_error() delete the reservation, and the following\ncall to remove_inode_hugepages() will increment h-\u003eresv_hugepages\ncausing a 100% reproducible leak.\n\nWe should treat the is_continue case similar to adding a page into the\npagecache and set new_pagecache_page to true, to indicate that there is\nno reservation to restore on the error path, and we need not call\nrestore_reserve_on_error().  Rename new_pagecache_page to\npage_in_pagecache to make that clear.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47214",
          "url": "https://www.suse.com/security/cve/CVE-2021-47214"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222710 for CVE-2021-47214",
          "url": "https://bugzilla.suse.com/1222710"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47214"
    },
    {
      "cve": "CVE-2021-47215",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47215"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/mlx5e: kTLS, Fix crash in RX resync flow\n\nFor the TLS RX resync flow, we maintain a list of TLS contexts\nthat require some attention, to communicate their resync information\nto the HW.\nHere we fix list corruptions, by protecting the entries against\nmovements coming from resync_handle_seq_match(), until their resync\nhandling in napi is fully completed.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47215",
          "url": "https://www.suse.com/security/cve/CVE-2021-47215"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222704 for CVE-2021-47215",
          "url": "https://bugzilla.suse.com/1222704"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47215"
    },
    {
      "cve": "CVE-2021-47216",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47216"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: advansys: Fix kernel pointer leak\n\nPointers should be printed with %p or %px rather than cast to \u0027unsigned\nlong\u0027 and printed with %lx.\n\nChange %lx to %p to print the hashed pointer.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47216",
          "url": "https://www.suse.com/security/cve/CVE-2021-47216"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222876 for CVE-2021-47216",
          "url": "https://bugzilla.suse.com/1222876"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "low"
        }
      ],
      "title": "CVE-2021-47216"
    },
    {
      "cve": "CVE-2021-47217",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47217"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nx86/hyperv: Fix NULL deref in set_hv_tscchange_cb() if Hyper-V setup fails\n\nCheck for a valid hv_vp_index array prior to derefencing hv_vp_index when\nsetting Hyper-V\u0027s TSC change callback.  If Hyper-V setup failed in\nhyperv_init(), the kernel will still report that it\u0027s running under\nHyper-V, but will have silently disabled nearly all functionality.\n\n  BUG: kernel NULL pointer dereference, address: 0000000000000010\n  #PF: supervisor read access in kernel mode\n  #PF: error_code(0x0000) - not-present page\n  PGD 0 P4D 0\n  Oops: 0000 [#1] SMP\n  CPU: 4 PID: 1 Comm: swapper/0 Not tainted 5.15.0-rc2+ #75\n  Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 0.0.0 02/06/2015\n  RIP: 0010:set_hv_tscchange_cb+0x15/0xa0\n  Code: \u003c8b\u003e 04 82 8b 15 12 17 85 01 48 c1 e0 20 48 0d ee 00 01 00 f6 c6 08\n  ...\n  Call Trace:\n   kvm_arch_init+0x17c/0x280\n   kvm_init+0x31/0x330\n   vmx_init+0xba/0x13a\n   do_one_initcall+0x41/0x1c0\n   kernel_init_freeable+0x1f2/0x23b\n   kernel_init+0x16/0x120\n   ret_from_fork+0x22/0x30",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47217",
          "url": "https://www.suse.com/security/cve/CVE-2021-47217"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222836 for CVE-2021-47217",
          "url": "https://bugzilla.suse.com/1222836"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47217"
    },
    {
      "cve": "CVE-2021-47218",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47218"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nselinux: fix NULL-pointer dereference when hashtab allocation fails\n\nWhen the hash table slot array allocation fails in hashtab_init(),\nh-\u003esize is left initialized with a non-zero value, but the h-\u003ehtable\npointer is NULL. This may then cause a NULL pointer dereference, since\nthe policydb code relies on the assumption that even after a failed\nhashtab_init(), hashtab_map() and hashtab_destroy() can be safely called\non it. Yet, these detect an empty hashtab only by looking at the size.\n\nFix this by making sure that hashtab_init() always leaves behind a valid\nempty hashtab when the allocation fails.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47218",
          "url": "https://www.suse.com/security/cve/CVE-2021-47218"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222791 for CVE-2021-47218",
          "url": "https://bugzilla.suse.com/1222791"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47218"
    },
    {
      "cve": "CVE-2021-47219",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47219"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: scsi_debug: Fix out-of-bound read in resp_report_tgtpgs()\n\nThe following issue was observed running syzkaller:\n\nBUG: KASAN: slab-out-of-bounds in memcpy include/linux/string.h:377 [inline]\nBUG: KASAN: slab-out-of-bounds in sg_copy_buffer+0x150/0x1c0 lib/scatterlist.c:831\nRead of size 2132 at addr ffff8880aea95dc8 by task syz-executor.0/9815\n\nCPU: 0 PID: 9815 Comm: syz-executor.0 Not tainted 4.19.202-00874-gfc0fe04215a9 #2\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.10.2-1ubuntu1 04/01/2014\nCall Trace:\n __dump_stack lib/dump_stack.c:77 [inline]\n dump_stack+0xe4/0x14a lib/dump_stack.c:118\n print_address_description+0x73/0x280 mm/kasan/report.c:253\n kasan_report_error mm/kasan/report.c:352 [inline]\n kasan_report+0x272/0x370 mm/kasan/report.c:410\n memcpy+0x1f/0x50 mm/kasan/kasan.c:302\n memcpy include/linux/string.h:377 [inline]\n sg_copy_buffer+0x150/0x1c0 lib/scatterlist.c:831\n fill_from_dev_buffer+0x14f/0x340 drivers/scsi/scsi_debug.c:1021\n resp_report_tgtpgs+0x5aa/0x770 drivers/scsi/scsi_debug.c:1772\n schedule_resp+0x464/0x12f0 drivers/scsi/scsi_debug.c:4429\n scsi_debug_queuecommand+0x467/0x1390 drivers/scsi/scsi_debug.c:5835\n scsi_dispatch_cmd+0x3fc/0x9b0 drivers/scsi/scsi_lib.c:1896\n scsi_request_fn+0x1042/0x1810 drivers/scsi/scsi_lib.c:2034\n __blk_run_queue_uncond block/blk-core.c:464 [inline]\n __blk_run_queue+0x1a4/0x380 block/blk-core.c:484\n blk_execute_rq_nowait+0x1c2/0x2d0 block/blk-exec.c:78\n sg_common_write.isra.19+0xd74/0x1dc0 drivers/scsi/sg.c:847\n sg_write.part.23+0x6e0/0xd00 drivers/scsi/sg.c:716\n sg_write+0x64/0xa0 drivers/scsi/sg.c:622\n __vfs_write+0xed/0x690 fs/read_write.c:485\nkill_bdev:block_device:00000000e138492c\n vfs_write+0x184/0x4c0 fs/read_write.c:549\n ksys_write+0x107/0x240 fs/read_write.c:599\n do_syscall_64+0xc2/0x560 arch/x86/entry/common.c:293\n entry_SYSCALL_64_after_hwframe+0x49/0xbe\n\nWe get \u0027alen\u0027 from command its type is int. If userspace passes a large\nlength we will get a negative \u0027alen\u0027.\n\nSwitch n, alen, and rlen to u32.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47219",
          "url": "https://www.suse.com/security/cve/CVE-2021-47219"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222824 for CVE-2021-47219",
          "url": "https://bugzilla.suse.com/1222824"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47219"
    },
    {
      "cve": "CVE-2022-48631",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-48631"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\next4: fix bug in extents parsing when eh_entries == 0 and eh_depth \u003e 0\n\nWhen walking through an inode extents, the ext4_ext_binsearch_idx() function\nassumes that the extent header has been previously validated.  However, there\nare no checks that verify that the number of entries (eh-\u003eeh_entries) is\nnon-zero when depth is \u003e 0.  And this will lead to problems because the\nEXT_FIRST_INDEX() and EXT_LAST_INDEX() will return garbage and result in this:\n\n[  135.245946] ------------[ cut here ]------------\n[  135.247579] kernel BUG at fs/ext4/extents.c:2258!\n[  135.249045] invalid opcode: 0000 [#1] PREEMPT SMP\n[  135.250320] CPU: 2 PID: 238 Comm: tmp118 Not tainted 5.19.0-rc8+ #4\n[  135.252067] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.15.0-0-g2dd4b9b-rebuilt.opensuse.org 04/01/2014\n[  135.255065] RIP: 0010:ext4_ext_map_blocks+0xc20/0xcb0\n[  135.256475] Code:\n[  135.261433] RSP: 0018:ffffc900005939f8 EFLAGS: 00010246\n[  135.262847] RAX: 0000000000000024 RBX: ffffc90000593b70 RCX: 0000000000000023\n[  135.264765] RDX: ffff8880038e5f10 RSI: 0000000000000003 RDI: ffff8880046e922c\n[  135.266670] RBP: ffff8880046e9348 R08: 0000000000000001 R09: ffff888002ca580c\n[  135.268576] R10: 0000000000002602 R11: 0000000000000000 R12: 0000000000000024\n[  135.270477] R13: 0000000000000000 R14: 0000000000000024 R15: 0000000000000000\n[  135.272394] FS:  00007fdabdc56740(0000) GS:ffff88807dd00000(0000) knlGS:0000000000000000\n[  135.274510] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[  135.276075] CR2: 00007ffc26bd4f00 CR3: 0000000006261004 CR4: 0000000000170ea0\n[  135.277952] Call Trace:\n[  135.278635]  \u003cTASK\u003e\n[  135.279247]  ? preempt_count_add+0x6d/0xa0\n[  135.280358]  ? percpu_counter_add_batch+0x55/0xb0\n[  135.281612]  ? _raw_read_unlock+0x18/0x30\n[  135.282704]  ext4_map_blocks+0x294/0x5a0\n[  135.283745]  ? xa_load+0x6f/0xa0\n[  135.284562]  ext4_mpage_readpages+0x3d6/0x770\n[  135.285646]  read_pages+0x67/0x1d0\n[  135.286492]  ? folio_add_lru+0x51/0x80\n[  135.287441]  page_cache_ra_unbounded+0x124/0x170\n[  135.288510]  filemap_get_pages+0x23d/0x5a0\n[  135.289457]  ? path_openat+0xa72/0xdd0\n[  135.290332]  filemap_read+0xbf/0x300\n[  135.291158]  ? _raw_spin_lock_irqsave+0x17/0x40\n[  135.292192]  new_sync_read+0x103/0x170\n[  135.293014]  vfs_read+0x15d/0x180\n[  135.293745]  ksys_read+0xa1/0xe0\n[  135.294461]  do_syscall_64+0x3c/0x80\n[  135.295284]  entry_SYSCALL_64_after_hwframe+0x46/0xb0\n\nThis patch simply adds an extra check in __ext4_ext_check(), verifying that\neh_entries is not 0 when eh_depth is \u003e 0.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-48631",
          "url": "https://www.suse.com/security/cve/CVE-2022-48631"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223475 for CVE-2022-48631",
          "url": "https://bugzilla.suse.com/1223475"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-48631"
    },
    {
      "cve": "CVE-2022-48632",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-48632"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ni2c: mlxbf: prevent stack overflow in mlxbf_i2c_smbus_start_transaction()\n\nmemcpy() is called in a loop while \u0027operation-\u003elength\u0027 upper bound\nis not checked and \u0027data_idx\u0027 also increments.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-48632",
          "url": "https://www.suse.com/security/cve/CVE-2022-48632"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223481 for CVE-2022-48632",
          "url": "https://bugzilla.suse.com/1223481"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-48632"
    },
    {
      "cve": "CVE-2022-48634",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-48634"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/gma500: Fix BUG: sleeping function called from invalid context errors\n\ngma_crtc_page_flip() was holding the event_lock spinlock while calling\ncrtc_funcs-\u003emode_set_base() which takes ww_mutex.\n\nThe only reason to hold event_lock is to clear gma_crtc-\u003epage_flip_event\non mode_set_base() errors.\n\nInstead unlock it after setting gma_crtc-\u003epage_flip_event and on\nerrors re-take the lock and clear gma_crtc-\u003epage_flip_event it\nit is still set.\n\nThis fixes the following WARN/stacktrace:\n\n[  512.122953] BUG: sleeping function called from invalid context at kernel/locking/mutex.c:870\n[  512.123004] in_atomic(): 1, irqs_disabled(): 1, non_block: 0, pid: 1253, name: gnome-shell\n[  512.123031] preempt_count: 1, expected: 0\n[  512.123048] RCU nest depth: 0, expected: 0\n[  512.123066] INFO: lockdep is turned off.\n[  512.123080] irq event stamp: 0\n[  512.123094] hardirqs last  enabled at (0): [\u003c0000000000000000\u003e] 0x0\n[  512.123134] hardirqs last disabled at (0): [\u003cffffffff8d0ec28c\u003e] copy_process+0x9fc/0x1de0\n[  512.123176] softirqs last  enabled at (0): [\u003cffffffff8d0ec28c\u003e] copy_process+0x9fc/0x1de0\n[  512.123207] softirqs last disabled at (0): [\u003c0000000000000000\u003e] 0x0\n[  512.123233] Preemption disabled at:\n[  512.123241] [\u003c0000000000000000\u003e] 0x0\n[  512.123275] CPU: 3 PID: 1253 Comm: gnome-shell Tainted: G        W         5.19.0+ #1\n[  512.123304] Hardware name: Packard Bell dot s/SJE01_CT, BIOS V1.10 07/23/2013\n[  512.123323] Call Trace:\n[  512.123346]  \u003cTASK\u003e\n[  512.123370]  dump_stack_lvl+0x5b/0x77\n[  512.123412]  __might_resched.cold+0xff/0x13a\n[  512.123458]  ww_mutex_lock+0x1e/0xa0\n[  512.123495]  psb_gem_pin+0x2c/0x150 [gma500_gfx]\n[  512.123601]  gma_pipe_set_base+0x76/0x240 [gma500_gfx]\n[  512.123708]  gma_crtc_page_flip+0x95/0x130 [gma500_gfx]\n[  512.123808]  drm_mode_page_flip_ioctl+0x57d/0x5d0\n[  512.123897]  ? drm_mode_cursor2_ioctl+0x10/0x10\n[  512.123936]  drm_ioctl_kernel+0xa1/0x150\n[  512.123984]  drm_ioctl+0x21f/0x420\n[  512.124025]  ? drm_mode_cursor2_ioctl+0x10/0x10\n[  512.124070]  ? rcu_read_lock_bh_held+0xb/0x60\n[  512.124104]  ? lock_release+0x1ef/0x2d0\n[  512.124161]  __x64_sys_ioctl+0x8d/0xd0\n[  512.124203]  do_syscall_64+0x58/0x80\n[  512.124239]  ? do_syscall_64+0x67/0x80\n[  512.124267]  ? trace_hardirqs_on_prepare+0x55/0xe0\n[  512.124300]  ? do_syscall_64+0x67/0x80\n[  512.124340]  ? rcu_read_lock_sched_held+0x10/0x80\n[  512.124377]  entry_SYSCALL_64_after_hwframe+0x63/0xcd\n[  512.124411] RIP: 0033:0x7fcc4a70740f\n[  512.124442] Code: 00 48 89 44 24 18 31 c0 48 8d 44 24 60 c7 04 24 10 00 00 00 48 89 44 24 08 48 8d 44 24 20 48 89 44 24 10 b8 10 00 00 00 0f 05 \u003c89\u003e c2 3d 00 f0 ff ff 77 18 48 8b 44 24 18 64 48 2b 04 25 28 00 00\n[  512.124470] RSP: 002b:00007ffda73f5390 EFLAGS: 00000246 ORIG_RAX: 0000000000000010\n[  512.124503] RAX: ffffffffffffffda RBX: 000055cc9e474500 RCX: 00007fcc4a70740f\n[  512.124524] RDX: 00007ffda73f5420 RSI: 00000000c01864b0 RDI: 0000000000000009\n[  512.124544] RBP: 00007ffda73f5420 R08: 000055cc9c0b0cb0 R09: 0000000000000034\n[  512.124564] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000c01864b0\n[  512.124584] R13: 0000000000000009 R14: 000055cc9df484d0 R15: 000055cc9af5d0c0\n[  512.124647]  \u003c/TASK\u003e",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-48634",
          "url": "https://www.suse.com/security/cve/CVE-2022-48634"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223501 for CVE-2022-48634",
          "url": "https://bugzilla.suse.com/1223501"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-48634"
    },
    {
      "cve": "CVE-2022-48636",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-48636"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ns390/dasd: fix Oops in dasd_alias_get_start_dev due to missing pavgroup\n\nFix Oops in dasd_alias_get_start_dev() function caused by the pavgroup\npointer being NULL.\n\nThe pavgroup pointer is checked on the entrance of the function but\nwithout the lcu-\u003elock being held. Therefore there is a race window\nbetween dasd_alias_get_start_dev() and _lcu_update() which sets\npavgroup to NULL with the lcu-\u003elock held.\n\nFix by checking the pavgroup pointer with lcu-\u003elock held.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-48636",
          "url": "https://www.suse.com/security/cve/CVE-2022-48636"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223512 for CVE-2022-48636",
          "url": "https://bugzilla.suse.com/1223512"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-48636"
    },
    {
      "cve": "CVE-2022-48637",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-48637"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbnxt: prevent skb UAF after handing over to PTP worker\n\nWhen reading the timestamp is required bnxt_tx_int() hands\nover the ownership of the completed skb to the PTP worker.\nThe skb should not be used afterwards, as the worker may\nrun before the rest of our code and free the skb, leading\nto a use-after-free.\n\nSince dev_kfree_skb_any() accepts NULL make the loss of\nownership more obvious and set skb to NULL.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-48637",
          "url": "https://www.suse.com/security/cve/CVE-2022-48637"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223517 for CVE-2022-48637",
          "url": "https://bugzilla.suse.com/1223517"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-48637"
    },
    {
      "cve": "CVE-2022-48638",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-48638"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncgroup: cgroup_get_from_id() must check the looked-up kn is a directory\n\ncgroup has to be one kernfs dir, otherwise kernel panic is caused,\nespecially cgroup id is provide from userspace.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-48638",
          "url": "https://www.suse.com/security/cve/CVE-2022-48638"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223522 for CVE-2022-48638",
          "url": "https://bugzilla.suse.com/1223522"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-48638"
    },
    {
      "cve": "CVE-2022-48639",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-48639"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: sched: fix possible refcount leak in tc_new_tfilter()\n\ntfilter_put need to be called to put the refount got by tp-\u003eops-\u003eget to\navoid possible refcount leak when chain-\u003etmplt_ops != NULL and\nchain-\u003etmplt_ops != tp-\u003eops.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-48639",
          "url": "https://www.suse.com/security/cve/CVE-2022-48639"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223490 for CVE-2022-48639",
          "url": "https://bugzilla.suse.com/1223490"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-48639"
    },
    {
      "cve": "CVE-2022-48640",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-48640"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbonding: fix NULL deref in bond_rr_gen_slave_id\n\nFix a NULL dereference of the struct bonding.rr_tx_counter member because\nif a bond is initially created with an initial mode != zero (Round Robin)\nthe memory required for the counter is never created and when the mode is\nchanged there is never any attempt to verify the memory is allocated upon\nswitching modes.\n\nThis causes the following Oops on an aarch64 machine:\n    [  334.686773] Unable to handle kernel paging request at virtual address ffff2c91ac905000\n    [  334.694703] Mem abort info:\n    [  334.697486]   ESR = 0x0000000096000004\n    [  334.701234]   EC = 0x25: DABT (current EL), IL = 32 bits\n    [  334.706536]   SET = 0, FnV = 0\n    [  334.709579]   EA = 0, S1PTW = 0\n    [  334.712719]   FSC = 0x04: level 0 translation fault\n    [  334.717586] Data abort info:\n    [  334.720454]   ISV = 0, ISS = 0x00000004\n    [  334.724288]   CM = 0, WnR = 0\n    [  334.727244] swapper pgtable: 4k pages, 48-bit VAs, pgdp=000008044d662000\n    [  334.733944] [ffff2c91ac905000] pgd=0000000000000000, p4d=0000000000000000\n    [  334.740734] Internal error: Oops: 96000004 [#1] SMP\n    [  334.745602] Modules linked in: bonding tls veth rfkill sunrpc arm_spe_pmu vfat fat acpi_ipmi ipmi_ssif ixgbe igb i40e mdio ipmi_devintf ipmi_msghandler arm_cmn arm_dsu_pmu cppc_cpufreq acpi_tad fuse zram crct10dif_ce ast ghash_ce sbsa_gwdt nvme drm_vram_helper drm_ttm_helper nvme_core ttm xgene_hwmon\n    [  334.772217] CPU: 7 PID: 2214 Comm: ping Not tainted 6.0.0-rc4-00133-g64ae13ed4784 #4\n    [  334.779950] Hardware name: GIGABYTE R272-P31-00/MP32-AR1-00, BIOS F18v (SCP: 1.08.20211002) 12/01/2021\n    [  334.789244] pstate: 60400009 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)\n    [  334.796196] pc : bond_rr_gen_slave_id+0x40/0x124 [bonding]\n    [  334.801691] lr : bond_xmit_roundrobin_slave_get+0x38/0xdc [bonding]\n    [  334.807962] sp : ffff8000221733e0\n    [  334.811265] x29: ffff8000221733e0 x28: ffffdbac8572d198 x27: ffff80002217357c\n    [  334.818392] x26: 000000000000002a x25: ffffdbacb33ee000 x24: ffff07ff980fa000\n    [  334.825519] x23: ffffdbacb2e398ba x22: ffff07ff98102000 x21: ffff07ff981029c0\n    [  334.832646] x20: 0000000000000001 x19: ffff07ff981029c0 x18: 0000000000000014\n    [  334.839773] x17: 0000000000000000 x16: ffffdbacb1004364 x15: 0000aaaabe2f5a62\n    [  334.846899] x14: ffff07ff8e55d968 x13: ffff07ff8e55db30 x12: 0000000000000000\n    [  334.854026] x11: ffffdbacb21532e8 x10: 0000000000000001 x9 : ffffdbac857178ec\n    [  334.861153] x8 : ffff07ff9f6e5a28 x7 : 0000000000000000 x6 : 000000007c2b3742\n    [  334.868279] x5 : ffff2c91ac905000 x4 : ffff2c91ac905000 x3 : ffff07ff9f554400\n    [  334.875406] x2 : ffff2c91ac905000 x1 : 0000000000000001 x0 : ffff07ff981029c0\n    [  334.882532] Call trace:\n    [  334.884967]  bond_rr_gen_slave_id+0x40/0x124 [bonding]\n    [  334.890109]  bond_xmit_roundrobin_slave_get+0x38/0xdc [bonding]\n    [  334.896033]  __bond_start_xmit+0x128/0x3a0 [bonding]\n    [  334.901001]  bond_start_xmit+0x54/0xb0 [bonding]\n    [  334.905622]  dev_hard_start_xmit+0xb4/0x220\n    [  334.909798]  __dev_queue_xmit+0x1a0/0x720\n    [  334.913799]  arp_xmit+0x3c/0xbc\n    [  334.916932]  arp_send_dst+0x98/0xd0\n    [  334.920410]  arp_solicit+0xe8/0x230\n    [  334.923888]  neigh_probe+0x60/0xb0\n    [  334.927279]  __neigh_event_send+0x3b0/0x470\n    [  334.931453]  neigh_resolve_output+0x70/0x90\n    [  334.935626]  ip_finish_output2+0x158/0x514\n    [  334.939714]  __ip_finish_output+0xac/0x1a4\n    [  334.943800]  ip_finish_output+0x40/0xfc\n    [  334.947626]  ip_output+0xf8/0x1a4\n    [  334.950931]  ip_send_skb+0x5c/0x100\n    [  334.954410]  ip_push_pending_frames+0x3c/0x60\n    [  334.958758]  raw_sendmsg+0x458/0x6d0\n    [  334.962325]  inet_sendmsg+0x50/0x80\n    [  334.965805]  sock_sendmsg+0x60/0x6c\n    [  334.969286]  __sys_sendto+0xc8/0x134\n    [  334.972853]  __arm64_sys_sendto+0x34/0x4c\n---truncated---",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-48640",
          "url": "https://www.suse.com/security/cve/CVE-2022-48640"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223499 for CVE-2022-48640",
          "url": "https://bugzilla.suse.com/1223499"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-48640"
    },
    {
      "cve": "CVE-2022-48642",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-48642"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nf_tables: fix percpu memory leak at nf_tables_addchain()\n\nIt seems to me that percpu memory for chain stats started leaking since\ncommit 3bc158f8d0330f0a (\"netfilter: nf_tables: map basechain priority to\nhardware priority\") when nft_chain_offload_priority() returned an error.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-48642",
          "url": "https://www.suse.com/security/cve/CVE-2022-48642"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223478 for CVE-2022-48642",
          "url": "https://bugzilla.suse.com/1223478"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "low"
        }
      ],
      "title": "CVE-2022-48642"
    },
    {
      "cve": "CVE-2022-48644",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-48644"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/sched: taprio: avoid disabling offload when it was never enabled\n\nIn an incredibly strange API design decision, qdisc-\u003edestroy() gets\ncalled even if qdisc-\u003einit() never succeeded, not exclusively since\ncommit 87b60cfacf9f (\"net_sched: fix error recovery at qdisc creation\"),\nbut apparently also earlier (in the case of qdisc_create_dflt()).\n\nThe taprio qdisc does not fully acknowledge this when it attempts full\noffload, because it starts off with q-\u003eflags = TAPRIO_FLAGS_INVALID in\ntaprio_init(), then it replaces q-\u003eflags with TCA_TAPRIO_ATTR_FLAGS\nparsed from netlink (in taprio_change(), tail called from taprio_init()).\n\nBut in taprio_destroy(), we call taprio_disable_offload(), and this\ndetermines what to do based on FULL_OFFLOAD_IS_ENABLED(q-\u003eflags).\n\nBut looking at the implementation of FULL_OFFLOAD_IS_ENABLED()\n(a bitwise check of bit 1 in q-\u003eflags), it is invalid to call this macro\non q-\u003eflags when it contains TAPRIO_FLAGS_INVALID, because that is set\nto U32_MAX, and therefore FULL_OFFLOAD_IS_ENABLED() will return true on\nan invalid set of flags.\n\nAs a result, it is possible to crash the kernel if user space forces an\nerror between setting q-\u003eflags = TAPRIO_FLAGS_INVALID, and the calling\nof taprio_enable_offload(). This is because drivers do not expect the\noffload to be disabled when it was never enabled.\n\nThe error that we force here is to attach taprio as a non-root qdisc,\nbut instead as child of an mqprio root qdisc:\n\n$ tc qdisc add dev swp0 root handle 1: \\\n\tmqprio num_tc 8 map 0 1 2 3 4 5 6 7 \\\n\tqueues 1@0 1@1 1@2 1@3 1@4 1@5 1@6 1@7 hw 0\n$ tc qdisc replace dev swp0 parent 1:1 \\\n\ttaprio num_tc 8 map 0 1 2 3 4 5 6 7 \\\n\tqueues 1@0 1@1 1@2 1@3 1@4 1@5 1@6 1@7 base-time 0 \\\n\tsched-entry S 0x7f 990000 sched-entry S 0x80 100000 \\\n\tflags 0x0 clockid CLOCK_TAI\nUnable to handle kernel paging request at virtual address fffffffffffffff8\n[fffffffffffffff8] pgd=0000000000000000, p4d=0000000000000000\nInternal error: Oops: 96000004 [#1] PREEMPT SMP\nCall trace:\n taprio_dump+0x27c/0x310\n vsc9959_port_setup_tc+0x1f4/0x460\n felix_port_setup_tc+0x24/0x3c\n dsa_slave_setup_tc+0x54/0x27c\n taprio_disable_offload.isra.0+0x58/0xe0\n taprio_destroy+0x80/0x104\n qdisc_create+0x240/0x470\n tc_modify_qdisc+0x1fc/0x6b0\n rtnetlink_rcv_msg+0x12c/0x390\n netlink_rcv_skb+0x5c/0x130\n rtnetlink_rcv+0x1c/0x2c\n\nFix this by keeping track of the operations we made, and undo the\noffload only if we actually did it.\n\nI\u0027ve added \"bool offloaded\" inside a 4 byte hole between \"int clockid\"\nand \"atomic64_t picos_per_byte\". Now the first cache line looks like\nbelow:\n\n$ pahole -C taprio_sched net/sched/sch_taprio.o\nstruct taprio_sched {\n        struct Qdisc * *           qdiscs;               /*     0     8 */\n        struct Qdisc *             root;                 /*     8     8 */\n        u32                        flags;                /*    16     4 */\n        enum tk_offsets            tk_offset;            /*    20     4 */\n        int                        clockid;              /*    24     4 */\n        bool                       offloaded;            /*    28     1 */\n\n        /* XXX 3 bytes hole, try to pack */\n\n        atomic64_t                 picos_per_byte;       /*    32     0 */\n\n        /* XXX 8 bytes hole, try to pack */\n\n        spinlock_t                 current_entry_lock;   /*    40     0 */\n\n        /* XXX 8 bytes hole, try to pack */\n\n        struct sched_entry *       current_entry;        /*    48     8 */\n        struct sched_gate_list *   oper_sched;           /*    56     8 */\n        /* --- cacheline 1 boundary (64 bytes) --- */",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-48644",
          "url": "https://www.suse.com/security/cve/CVE-2022-48644"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223511 for CVE-2022-48644",
          "url": "https://bugzilla.suse.com/1223511"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-48644"
    },
    {
      "cve": "CVE-2022-48646",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-48646"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsfc/siena: fix null pointer dereference in efx_hard_start_xmit\n\nLike in previous patch for sfc, prevent potential (but unlikely) NULL\npointer dereference.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-48646",
          "url": "https://www.suse.com/security/cve/CVE-2022-48646"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223502 for CVE-2022-48646",
          "url": "https://bugzilla.suse.com/1223502"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-48646"
    },
    {
      "cve": "CVE-2022-48647",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-48647"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsfc: fix TX channel offset when using legacy interrupts\n\nIn legacy interrupt mode the tx_channel_offset was hardcoded to 1, but\nthat\u0027s not correct if efx_sepparate_tx_channels is false. In that case,\nthe offset is 0 because the tx queues are in the single existing channel\nat index 0, together with the rx queue.\n\nWithout this fix, as soon as you try to send any traffic, it tries to\nget the tx queues from an uninitialized channel getting these errors:\n  WARNING: CPU: 1 PID: 0 at drivers/net/ethernet/sfc/tx.c:540 efx_hard_start_xmit+0x12e/0x170 [sfc]\n  [...]\n  RIP: 0010:efx_hard_start_xmit+0x12e/0x170 [sfc]\n  [...]\n  Call Trace:\n   \u003cIRQ\u003e\n   dev_hard_start_xmit+0xd7/0x230\n   sch_direct_xmit+0x9f/0x360\n   __dev_queue_xmit+0x890/0xa40\n  [...]\n  BUG: unable to handle kernel NULL pointer dereference at 0000000000000020\n  [...]\n  RIP: 0010:efx_hard_start_xmit+0x153/0x170 [sfc]\n  [...]\n  Call Trace:\n   \u003cIRQ\u003e\n   dev_hard_start_xmit+0xd7/0x230\n   sch_direct_xmit+0x9f/0x360\n   __dev_queue_xmit+0x890/0xa40\n  [...]",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-48647",
          "url": "https://www.suse.com/security/cve/CVE-2022-48647"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223519 for CVE-2022-48647",
          "url": "https://bugzilla.suse.com/1223519"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-48647"
    },
    {
      "cve": "CVE-2022-48648",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-48648"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsfc: fix null pointer dereference in efx_hard_start_xmit\n\nTrying to get the channel from the tx_queue variable here is wrong\nbecause we can only be here if tx_queue is NULL, so we shouldn\u0027t\ndereference it. As the above comment in the code says, this is very\nunlikely to happen, but it\u0027s wrong anyway so let\u0027s fix it.\n\nI hit this issue because of a different bug that caused tx_queue to be\nNULL. If that happens, this is the error message that we get here:\n  BUG: unable to handle kernel NULL pointer dereference at 0000000000000020\n  [...]\n  RIP: 0010:efx_hard_start_xmit+0x153/0x170 [sfc]",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-48648",
          "url": "https://www.suse.com/security/cve/CVE-2022-48648"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223503 for CVE-2022-48648",
          "url": "https://bugzilla.suse.com/1223503"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-48648"
    },
    {
      "cve": "CVE-2022-48650",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-48650"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: qla2xxx: Fix memory leak in __qlt_24xx_handle_abts()\n\nCommit 8f394da36a36 (\"scsi: qla2xxx: Drop TARGET_SCF_LOOKUP_LUN_FROM_TAG\")\nmade the __qlt_24xx_handle_abts() function return early if\ntcm_qla2xxx_find_cmd_by_tag() didn\u0027t find a command, but it missed to clean\nup the allocated memory for the management command.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-48650",
          "url": "https://www.suse.com/security/cve/CVE-2022-48650"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223509 for CVE-2022-48650",
          "url": "https://bugzilla.suse.com/1223509"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-48650"
    },
    {
      "cve": "CVE-2022-48651",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-48651"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipvlan: Fix out-of-bound bugs caused by unset skb-\u003emac_header\n\nIf an AF_PACKET socket is used to send packets through ipvlan and the\ndefault xmit function of the AF_PACKET socket is changed from\ndev_queue_xmit() to packet_direct_xmit() via setsockopt() with the option\nname of PACKET_QDISC_BYPASS, the skb-\u003emac_header may not be reset and\nremains as the initial value of 65535, this may trigger slab-out-of-bounds\nbugs as following:\n\n=================================================================\nUG: KASAN: slab-out-of-bounds in ipvlan_xmit_mode_l2+0xdb/0x330 [ipvlan]\nPU: 2 PID: 1768 Comm: raw_send Kdump: loaded Not tainted 6.0.0-rc4+ #6\nardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.14.0-1.fc33\nall Trace:\nprint_address_description.constprop.0+0x1d/0x160\nprint_report.cold+0x4f/0x112\nkasan_report+0xa3/0x130\nipvlan_xmit_mode_l2+0xdb/0x330 [ipvlan]\nipvlan_start_xmit+0x29/0xa0 [ipvlan]\n__dev_direct_xmit+0x2e2/0x380\npacket_direct_xmit+0x22/0x60\npacket_snd+0x7c9/0xc40\nsock_sendmsg+0x9a/0xa0\n__sys_sendto+0x18a/0x230\n__x64_sys_sendto+0x74/0x90\ndo_syscall_64+0x3b/0x90\nentry_SYSCALL_64_after_hwframe+0x63/0xcd\n\nThe root cause is:\n  1. packet_snd() only reset skb-\u003emac_header when sock-\u003etype is SOCK_RAW\n     and skb-\u003eprotocol is not specified as in packet_parse_headers()\n\n  2. packet_direct_xmit() doesn\u0027t reset skb-\u003emac_header as dev_queue_xmit()\n\nIn this case, skb-\u003emac_header is 65535 when ipvlan_xmit_mode_l2() is\ncalled. So when ipvlan_xmit_mode_l2() gets mac header with eth_hdr() which\nuse \"skb-\u003ehead + skb-\u003emac_header\", out-of-bound access occurs.\n\nThis patch replaces eth_hdr() with skb_eth_hdr() in ipvlan_xmit_mode_l2()\nand reset mac header in multicast to solve this out-of-bound bug.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-48651",
          "url": "https://www.suse.com/security/cve/CVE-2022-48651"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223513 for CVE-2022-48651",
          "url": "https://bugzilla.suse.com/1223513"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223514 for CVE-2022-48651",
          "url": "https://bugzilla.suse.com/1223514"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "important"
        }
      ],
      "title": "CVE-2022-48651"
    },
    {
      "cve": "CVE-2022-48652",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-48652"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nice: Fix crash by keep old cfg when update TCs more than queues\n\nThere are problems if allocated queues less than Traffic Classes.\n\nCommit a632b2a4c920 (\"ice: ethtool: Prohibit improper channel config\nfor DCB\") already disallow setting less queues than TCs.\n\nAnother case is if we first set less queues, and later update more TCs\nconfig due to LLDP, ice_vsi_cfg_tc() will failed but left dirty\nnum_txq/rxq and tc_cfg in vsi, that will cause invalid pointer access.\n\n[   95.968089] ice 0000:3b:00.1: More TCs defined than queues/rings allocated.\n[   95.968092] ice 0000:3b:00.1: Trying to use more Rx queues (8), than were allocated (1)!\n[   95.968093] ice 0000:3b:00.1: Failed to config TC for VSI index: 0\n[   95.969621] general protection fault: 0000 [#1] SMP NOPTI\n[   95.969705] CPU: 1 PID: 58405 Comm: lldpad Kdump: loaded Tainted: G     U  W  O     --------- -t - 4.18.0 #1\n[   95.969867] Hardware name: O.E.M/BC11SPSCB10, BIOS 8.23 12/30/2021\n[   95.969992] RIP: 0010:devm_kmalloc+0xa/0x60\n[   95.970052] Code: 5c ff ff ff 31 c0 5b 5d 41 5c c3 b8 f4 ff ff ff eb f4 0f 1f 40 00 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 89 d1 \u003c8b\u003e 97 60 02 00 00 48 8d 7e 18 48 39 f7 72 3f 55 89 ce 53 48 8b 4c\n[   95.970344] RSP: 0018:ffffc9003f553888 EFLAGS: 00010206\n[   95.970425] RAX: dead000000000200 RBX: ffffea003c425b00 RCX: 00000000006080c0\n[   95.970536] RDX: 00000000006080c0 RSI: 0000000000000200 RDI: dead000000000200\n[   95.970648] RBP: dead000000000200 R08: 00000000000463c0 R09: ffff888ffa900000\n[   95.970760] R10: 0000000000000000 R11: 0000000000000002 R12: ffff888ff6b40100\n[   95.970870] R13: ffff888ff6a55018 R14: 0000000000000000 R15: ffff888ff6a55460\n[   95.970981] FS:  00007f51b7d24700(0000) GS:ffff88903ee80000(0000) knlGS:0000000000000000\n[   95.971108] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[   95.971197] CR2: 00007fac5410d710 CR3: 0000000f2c1de002 CR4: 00000000007606e0\n[   95.971309] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n[   95.971419] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\n[   95.971530] PKRU: 55555554\n[   95.971573] Call Trace:\n[   95.971622]  ice_setup_rx_ring+0x39/0x110 [ice]\n[   95.971695]  ice_vsi_setup_rx_rings+0x54/0x90 [ice]\n[   95.971774]  ice_vsi_open+0x25/0x120 [ice]\n[   95.971843]  ice_open_internal+0xb8/0x1f0 [ice]\n[   95.971919]  ice_ena_vsi+0x4f/0xd0 [ice]\n[   95.971987]  ice_dcb_ena_dis_vsi.constprop.5+0x29/0x90 [ice]\n[   95.972082]  ice_pf_dcb_cfg+0x29a/0x380 [ice]\n[   95.972154]  ice_dcbnl_setets+0x174/0x1b0 [ice]\n[   95.972220]  dcbnl_ieee_set+0x89/0x230\n[   95.972279]  ? dcbnl_ieee_del+0x150/0x150\n[   95.972341]  dcb_doit+0x124/0x1b0\n[   95.972392]  rtnetlink_rcv_msg+0x243/0x2f0\n[   95.972457]  ? dcb_doit+0x14d/0x1b0\n[   95.972510]  ? __kmalloc_node_track_caller+0x1d3/0x280\n[   95.972591]  ? rtnl_calcit.isra.31+0x100/0x100\n[   95.972661]  netlink_rcv_skb+0xcf/0xf0\n[   95.972720]  netlink_unicast+0x16d/0x220\n[   95.972781]  netlink_sendmsg+0x2ba/0x3a0\n[   95.975891]  sock_sendmsg+0x4c/0x50\n[   95.979032]  ___sys_sendmsg+0x2e4/0x300\n[   95.982147]  ? kmem_cache_alloc+0x13e/0x190\n[   95.985242]  ? __wake_up_common_lock+0x79/0x90\n[   95.988338]  ? __check_object_size+0xac/0x1b0\n[   95.991440]  ? _copy_to_user+0x22/0x30\n[   95.994539]  ? move_addr_to_user+0xbb/0xd0\n[   95.997619]  ? __sys_sendmsg+0x53/0x80\n[   96.000664]  __sys_sendmsg+0x53/0x80\n[   96.003747]  do_syscall_64+0x5b/0x1d0\n[   96.006862]  entry_SYSCALL_64_after_hwframe+0x65/0xca\n\nOnly update num_txq/rxq when passed check, and restore tc_cfg if setup\nqueue map failed.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-48652",
          "url": "https://www.suse.com/security/cve/CVE-2022-48652"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223520 for CVE-2022-48652",
          "url": "https://bugzilla.suse.com/1223520"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-48652"
    },
    {
      "cve": "CVE-2022-48653",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-48653"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nice: Don\u0027t double unplug aux on peer initiated reset\n\nIn the IDC callback that is accessed when the aux drivers request a reset,\nthe function to unplug the aux devices is called.  This function is also\ncalled in the ice_prepare_for_reset function. This double call is causing\na \"scheduling while atomic\" BUG.\n\n[  662.676430] ice 0000:4c:00.0 rocep76s0: cqp opcode = 0x1 maj_err_code = 0xffff min_err_code = 0x8003\n\n[  662.676609] ice 0000:4c:00.0 rocep76s0: [Modify QP Cmd Error][op_code=8] status=-29 waiting=1 completion_err=1 maj=0xffff min=0x8003\n\n[  662.815006] ice 0000:4c:00.0 rocep76s0: ICE OICR event notification: oicr = 0x10000003\n\n[  662.815014] ice 0000:4c:00.0 rocep76s0: critical PE Error, GLPE_CRITERR=0x00011424\n\n[  662.815017] ice 0000:4c:00.0 rocep76s0: Requesting a reset\n\n[  662.815475] BUG: scheduling while atomic: swapper/37/0/0x00010002\n\n[  662.815475] BUG: scheduling while atomic: swapper/37/0/0x00010002\n[  662.815477] Modules linked in: rpcsec_gss_krb5 auth_rpcgss nfsv4 dns_resolver nfs lockd grace fscache netfs rfkill 8021q garp mrp stp llc vfat fat rpcrdma intel_rapl_msr intel_rapl_common sunrpc i10nm_edac rdma_ucm nfit ib_srpt libnvdimm ib_isert iscsi_target_mod x86_pkg_temp_thermal intel_powerclamp coretemp target_core_mod snd_hda_intel ib_iser snd_intel_dspcfg libiscsi snd_intel_sdw_acpi scsi_transport_iscsi kvm_intel iTCO_wdt rdma_cm snd_hda_codec kvm iw_cm ipmi_ssif iTCO_vendor_support snd_hda_core irqbypass crct10dif_pclmul crc32_pclmul ghash_clmulni_intel snd_hwdep snd_seq snd_seq_device rapl snd_pcm snd_timer isst_if_mbox_pci pcspkr isst_if_mmio irdma intel_uncore idxd acpi_ipmi joydev isst_if_common snd mei_me idxd_bus ipmi_si soundcore i2c_i801 mei ipmi_devintf i2c_smbus i2c_ismt ipmi_msghandler acpi_power_meter acpi_pad rv(OE) ib_uverbs ib_cm ib_core xfs libcrc32c ast i2c_algo_bit drm_vram_helper drm_kms_helper syscopyarea sysfillrect sysimgblt fb_sys_fops drm_ttm_helpe\n r ttm\n[  662.815546]  nvme nvme_core ice drm crc32c_intel i40e t10_pi wmi pinctrl_emmitsburg dm_mirror dm_region_hash dm_log dm_mod fuse\n[  662.815557] Preemption disabled at:\n[  662.815558] [\u003c0000000000000000\u003e] 0x0\n[  662.815563] CPU: 37 PID: 0 Comm: swapper/37 Kdump: loaded Tainted: G S         OE     5.17.1 #2\n[  662.815566] Hardware name: Intel Corporation D50DNP/D50DNP, BIOS SE5C6301.86B.6624.D18.2111021741 11/02/2021\n[  662.815568] Call Trace:\n[  662.815572]  \u003cIRQ\u003e\n[  662.815574]  dump_stack_lvl+0x33/0x42\n[  662.815581]  __schedule_bug.cold.147+0x7d/0x8a\n[  662.815588]  __schedule+0x798/0x990\n[  662.815595]  schedule+0x44/0xc0\n[  662.815597]  schedule_preempt_disabled+0x14/0x20\n[  662.815600]  __mutex_lock.isra.11+0x46c/0x490\n[  662.815603]  ? __ibdev_printk+0x76/0xc0 [ib_core]\n[  662.815633]  device_del+0x37/0x3d0\n[  662.815639]  ice_unplug_aux_dev+0x1a/0x40 [ice]\n[  662.815674]  ice_schedule_reset+0x3c/0xd0 [ice]\n[  662.815693]  irdma_iidc_event_handler.cold.7+0xb6/0xd3 [irdma]\n[  662.815712]  ? bitmap_find_next_zero_area_off+0x45/0xa0\n[  662.815719]  ice_send_event_to_aux+0x54/0x70 [ice]\n[  662.815741]  ice_misc_intr+0x21d/0x2d0 [ice]\n[  662.815756]  __handle_irq_event_percpu+0x4c/0x180\n[  662.815762]  handle_irq_event_percpu+0xf/0x40\n[  662.815764]  handle_irq_event+0x34/0x60\n[  662.815766]  handle_edge_irq+0x9a/0x1c0\n[  662.815770]  __common_interrupt+0x62/0x100\n[  662.815774]  common_interrupt+0xb4/0xd0\n[  662.815779]  \u003c/IRQ\u003e\n[  662.815780]  \u003cTASK\u003e\n[  662.815780]  asm_common_interrupt+0x1e/0x40\n[  662.815785] RIP: 0010:cpuidle_enter_state+0xd6/0x380\n[  662.815789] Code: 49 89 c4 0f 1f 44 00 00 31 ff e8 65 d7 95 ff 45 84 ff 74 12 9c 58 f6 c4 02 0f 85 64 02 00 00 31 ff e8 ae c5 9c ff fb 45 85 f6 \u003c0f\u003e 88 12 01 00 00 49 63 d6 4c 2b 24 24 48 8d 04 52 48 8d 04 82 49\n[  662.815791] RSP: 0018:ff2c2c4f18edbe80 EFLAGS: 00000202\n[  662.815793] RAX: ff280805df140000 RBX: 0000000000000002 RCX: 000000000000001f\n[  662.815795] RDX: 0000009a52da2d08 R\n---truncated---",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-48653",
          "url": "https://www.suse.com/security/cve/CVE-2022-48653"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223474 for CVE-2022-48653",
          "url": "https://bugzilla.suse.com/1223474"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "low"
        }
      ],
      "title": "CVE-2022-48653"
    },
    {
      "cve": "CVE-2022-48654",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-48654"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nfnetlink_osf: fix possible bogus match in nf_osf_find()\n\nnf_osf_find() incorrectly returns true on mismatch, this leads to\ncopying uninitialized memory area in nft_osf which can be used to leak\nstale kernel stack data to userspace.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-48654",
          "url": "https://www.suse.com/security/cve/CVE-2022-48654"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223482 for CVE-2022-48654",
          "url": "https://bugzilla.suse.com/1223482"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "low"
        }
      ],
      "title": "CVE-2022-48654"
    },
    {
      "cve": "CVE-2022-48655",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-48655"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfirmware: arm_scmi: Harden accesses to the reset domains\n\nAccessing reset domains descriptors by the index upon the SCMI drivers\nrequests through the SCMI reset operations interface can potentially\nlead to out-of-bound violations if the SCMI driver misbehave.\n\nAdd an internal consistency check before any such domains descriptors\naccesses.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-48655",
          "url": "https://www.suse.com/security/cve/CVE-2022-48655"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223477 for CVE-2022-48655",
          "url": "https://bugzilla.suse.com/1223477"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-48655"
    },
    {
      "cve": "CVE-2022-48656",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-48656"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndmaengine: ti: k3-udma-private: Fix refcount leak bug in of_xudma_dev_get()\n\nWe should call of_node_put() for the reference returned by\nof_parse_phandle() in fail path or when it is not used anymore.\nHere we only need to move the of_node_put() before the check.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-48656",
          "url": "https://www.suse.com/security/cve/CVE-2022-48656"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223479 for CVE-2022-48656",
          "url": "https://bugzilla.suse.com/1223479"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "low"
        }
      ],
      "title": "CVE-2022-48656"
    },
    {
      "cve": "CVE-2022-48657",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-48657"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\narm64: topology: fix possible overflow in amu_fie_setup()\n\ncpufreq_get_hw_max_freq() returns max frequency in kHz as *unsigned int*,\nwhile freq_inv_set_max_ratio() gets passed this frequency in Hz as \u0027u64\u0027.\nMultiplying max frequency by 1000 can potentially result in overflow --\nmultiplying by 1000ULL instead should avoid that...\n\nFound by Linux Verification Center (linuxtesting.org) with the SVACE static\nanalysis tool.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-48657",
          "url": "https://www.suse.com/security/cve/CVE-2022-48657"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223484 for CVE-2022-48657",
          "url": "https://bugzilla.suse.com/1223484"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "low"
        }
      ],
      "title": "CVE-2022-48657"
    },
    {
      "cve": "CVE-2022-48658",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-48658"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm: slub: fix flush_cpu_slab()/__free_slab() invocations in task context.\n\nCommit 5a836bf6b09f (\"mm: slub: move flush_cpu_slab() invocations\n__free_slab() invocations out of IRQ context\") moved all flush_cpu_slab()\ninvocations to the global workqueue to avoid a problem related\nwith deactivate_slab()/__free_slab() being called from an IRQ context\non PREEMPT_RT kernels.\n\nWhen the flush_all_cpu_locked() function is called from a task context\nit may happen that a workqueue with WQ_MEM_RECLAIM bit set ends up\nflushing the global workqueue, this will cause a dependency issue.\n\n workqueue: WQ_MEM_RECLAIM nvme-delete-wq:nvme_delete_ctrl_work [nvme_core]\n   is flushing !WQ_MEM_RECLAIM events:flush_cpu_slab\n WARNING: CPU: 37 PID: 410 at kernel/workqueue.c:2637\n   check_flush_dependency+0x10a/0x120\n Workqueue: nvme-delete-wq nvme_delete_ctrl_work [nvme_core]\n RIP: 0010:check_flush_dependency+0x10a/0x120[  453.262125] Call Trace:\n __flush_work.isra.0+0xbf/0x220\n ? __queue_work+0x1dc/0x420\n flush_all_cpus_locked+0xfb/0x120\n __kmem_cache_shutdown+0x2b/0x320\n kmem_cache_destroy+0x49/0x100\n bioset_exit+0x143/0x190\n blk_release_queue+0xb9/0x100\n kobject_cleanup+0x37/0x130\n nvme_fc_ctrl_free+0xc6/0x150 [nvme_fc]\n nvme_free_ctrl+0x1ac/0x2b0 [nvme_core]\n\nFix this bug by creating a workqueue for the flush operation with\nthe WQ_MEM_RECLAIM bit set.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-48658",
          "url": "https://www.suse.com/security/cve/CVE-2022-48658"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223496 for CVE-2022-48658",
          "url": "https://bugzilla.suse.com/1223496"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-48658"
    },
    {
      "cve": "CVE-2022-48659",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-48659"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm/slub: fix to return errno if kmalloc() fails\n\nIn create_unique_id(), kmalloc(, GFP_KERNEL) can fail due to\nout-of-memory, if it fails, return errno correctly rather than\ntriggering panic via BUG_ON();\n\nkernel BUG at mm/slub.c:5893!\nInternal error: Oops - BUG: 0 [#1] PREEMPT SMP\n\nCall trace:\n sysfs_slab_add+0x258/0x260 mm/slub.c:5973\n __kmem_cache_create+0x60/0x118 mm/slub.c:4899\n create_cache mm/slab_common.c:229 [inline]\n kmem_cache_create_usercopy+0x19c/0x31c mm/slab_common.c:335\n kmem_cache_create+0x1c/0x28 mm/slab_common.c:390\n f2fs_kmem_cache_create fs/f2fs/f2fs.h:2766 [inline]\n f2fs_init_xattr_caches+0x78/0xb4 fs/f2fs/xattr.c:808\n f2fs_fill_super+0x1050/0x1e0c fs/f2fs/super.c:4149\n mount_bdev+0x1b8/0x210 fs/super.c:1400\n f2fs_mount+0x44/0x58 fs/f2fs/super.c:4512\n legacy_get_tree+0x30/0x74 fs/fs_context.c:610\n vfs_get_tree+0x40/0x140 fs/super.c:1530\n do_new_mount+0x1dc/0x4e4 fs/namespace.c:3040\n path_mount+0x358/0x914 fs/namespace.c:3370\n do_mount fs/namespace.c:3383 [inline]\n __do_sys_mount fs/namespace.c:3591 [inline]\n __se_sys_mount fs/namespace.c:3568 [inline]\n __arm64_sys_mount+0x2f8/0x408 fs/namespace.c:3568",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-48659",
          "url": "https://www.suse.com/security/cve/CVE-2022-48659"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223498 for CVE-2022-48659",
          "url": "https://bugzilla.suse.com/1223498"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-48659"
    },
    {
      "cve": "CVE-2022-48660",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-48660"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ngpiolib: cdev: Set lineevent_state::irq after IRQ register successfully\n\nWhen running gpio test on nxp-ls1028 platform with below command\ngpiomon --num-events=3 --rising-edge gpiochip1 25\nThere will be a warning trace as below:\nCall trace:\nfree_irq+0x204/0x360\nlineevent_free+0x64/0x70\ngpio_ioctl+0x598/0x6a0\n__arm64_sys_ioctl+0xb4/0x100\ninvoke_syscall+0x5c/0x130\n......\nel0t_64_sync+0x1a0/0x1a4\nThe reason of this issue is that calling request_threaded_irq()\nfunction failed, and then lineevent_free() is invoked to release\nthe resource. Since the lineevent_state::irq was already set, so\nthe subsequent invocation of free_irq() would trigger the above\nwarning call trace. To fix this issue, set the lineevent_state::irq\nafter the IRQ register successfully.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-48660",
          "url": "https://www.suse.com/security/cve/CVE-2022-48660"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223487 for CVE-2022-48660",
          "url": "https://bugzilla.suse.com/1223487"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "low"
        }
      ],
      "title": "CVE-2022-48660"
    },
    {
      "cve": "CVE-2022-48662",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-48662"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/i915/gem: Really move i915_gem_context.link under ref protection\n\ni915_perf assumes that it can use the i915_gem_context reference to\nprotect its i915-\u003egem.contexts.list iteration. However, this requires\nthat we do not remove the context from the list until after we drop the\nfinal reference and release the struct. If, as currently, we remove the\ncontext from the list during context_close(), the link.next pointer may\nbe poisoned while we are holding the context reference and cause a GPF:\n\n[ 4070.573157] i915 0000:00:02.0: [drm:i915_perf_open_ioctl [i915]] filtering on ctx_id=0x1fffff ctx_id_mask=0x1fffff\n[ 4070.574881] general protection fault, probably for non-canonical address 0xdead000000000100: 0000 [#1] PREEMPT SMP\n[ 4070.574897] CPU: 1 PID: 284392 Comm: amd_performance Tainted: G            E     5.17.9 #180\n[ 4070.574903] Hardware name: Intel Corporation NUC7i5BNK/NUC7i5BNB, BIOS BNKBL357.86A.0052.2017.0918.1346 09/18/2017\n[ 4070.574907] RIP: 0010:oa_configure_all_contexts.isra.0+0x222/0x350 [i915]\n[ 4070.574982] Code: 08 e8 32 6e 10 e1 4d 8b 6d 50 b8 ff ff ff ff 49 83 ed 50 f0 41 0f c1 04 24 83 f8 01 0f 84 e3 00 00 00 85 c0 0f 8e fa 00 00 00 \u003c49\u003e 8b 45 50 48 8d 70 b0 49 8d 45 50 48 39 44 24 10 0f 85 34 fe ff\n[ 4070.574990] RSP: 0018:ffffc90002077b78 EFLAGS: 00010202\n[ 4070.574995] RAX: 0000000000000002 RBX: 0000000000000002 RCX: 0000000000000000\n[ 4070.575000] RDX: 0000000000000001 RSI: ffffc90002077b20 RDI: ffff88810ddc7c68\n[ 4070.575004] RBP: 0000000000000001 R08: ffff888103242648 R09: fffffffffffffffc\n[ 4070.575008] R10: ffffffff82c50bc0 R11: 0000000000025c80 R12: ffff888101bf1860\n[ 4070.575012] R13: dead0000000000b0 R14: ffffc90002077c04 R15: ffff88810be5cabc\n[ 4070.575016] FS:  00007f1ed50c0780(0000) GS:ffff88885ec80000(0000) knlGS:0000000000000000\n[ 4070.575021] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[ 4070.575025] CR2: 00007f1ed5590280 CR3: 000000010ef6f005 CR4: 00000000003706e0\n[ 4070.575029] Call Trace:\n[ 4070.575033]  \u003cTASK\u003e\n[ 4070.575037]  lrc_configure_all_contexts+0x13e/0x150 [i915]\n[ 4070.575103]  gen8_enable_metric_set+0x4d/0x90 [i915]\n[ 4070.575164]  i915_perf_open_ioctl+0xbc0/0x1500 [i915]\n[ 4070.575224]  ? asm_common_interrupt+0x1e/0x40\n[ 4070.575232]  ? i915_oa_init_reg_state+0x110/0x110 [i915]\n[ 4070.575290]  drm_ioctl_kernel+0x85/0x110\n[ 4070.575296]  ? update_load_avg+0x5f/0x5e0\n[ 4070.575302]  drm_ioctl+0x1d3/0x370\n[ 4070.575307]  ? i915_oa_init_reg_state+0x110/0x110 [i915]\n[ 4070.575382]  ? gen8_gt_irq_handler+0x46/0x130 [i915]\n[ 4070.575445]  __x64_sys_ioctl+0x3c4/0x8d0\n[ 4070.575451]  ? __do_softirq+0xaa/0x1d2\n[ 4070.575456]  do_syscall_64+0x35/0x80\n[ 4070.575461]  entry_SYSCALL_64_after_hwframe+0x44/0xae\n[ 4070.575467] RIP: 0033:0x7f1ed5c10397\n[ 4070.575471] Code: 3c 1c e8 1c ff ff ff 85 c0 79 87 49 c7 c4 ff ff ff ff 5b 5d 4c 89 e0 41 5c c3 66 0f 1f 84 00 00 00 00 00 b8 10 00 00 00 0f 05 \u003c48\u003e 3d 01 f0 ff ff 73 01 c3 48 8b 0d a9 da 0d 00 f7 d8 64 89 01 48\n[ 4070.575478] RSP: 002b:00007ffd65c8d7a8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010\n[ 4070.575484] RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 00007f1ed5c10397\n[ 4070.575488] RDX: 00007ffd65c8d7c0 RSI: 0000000040106476 RDI: 0000000000000006\n[ 4070.575492] RBP: 00005620972f9c60 R08: 000000000000000a R09: 0000000000000005\n[ 4070.575496] R10: 000000000000000d R11: 0000000000000246 R12: 000000000000000a\n[ 4070.575500] R13: 000000000000000d R14: 0000000000000000 R15: 00007ffd65c8d7c0\n[ 4070.575505]  \u003c/TASK\u003e\n[ 4070.575507] Modules linked in: nls_ascii(E) nls_cp437(E) vfat(E) fat(E) i915(E) x86_pkg_temp_thermal(E) intel_powerclamp(E) crct10dif_pclmul(E) crc32_pclmul(E) crc32c_intel(E) aesni_intel(E) crypto_simd(E) intel_gtt(E) cryptd(E) ttm(E) rapl(E) intel_cstate(E) drm_kms_helper(E) cfbfillrect(E) syscopyarea(E) cfbimgblt(E) intel_uncore(E) sysfillrect(E) mei_me(E) sysimgblt(E) i2c_i801(E) fb_sys_fops(E) mei(E) intel_pch_thermal(E) i2c_smbus\n---truncated---",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-48662",
          "url": "https://www.suse.com/security/cve/CVE-2022-48662"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223505 for CVE-2022-48662",
          "url": "https://bugzilla.suse.com/1223505"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223521 for CVE-2022-48662",
          "url": "https://bugzilla.suse.com/1223521"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "important"
        }
      ],
      "title": "CVE-2022-48662"
    },
    {
      "cve": "CVE-2022-48663",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-48663"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ngpio: mockup: fix NULL pointer dereference when removing debugfs\n\nWe now remove the device\u0027s debugfs entries when unbinding the driver.\nThis now causes a NULL-pointer dereference on module exit because the\nplatform devices are unregistered *after* the global debugfs directory\nhas been recursively removed. Fix it by unregistering the devices first.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-48663",
          "url": "https://www.suse.com/security/cve/CVE-2022-48663"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223523 for CVE-2022-48663",
          "url": "https://bugzilla.suse.com/1223523"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-48663"
    },
    {
      "cve": "CVE-2022-48667",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-48667"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmb3: fix temporary data corruption in insert range\n\ninsert range doesn\u0027t discard the affected cached region\nso can risk temporarily corrupting file data.\n\nAlso includes some minor cleanup (avoiding rereading\ninode size repeatedly unnecessarily) to make it clearer.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-48667",
          "url": "https://www.suse.com/security/cve/CVE-2022-48667"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223518 for CVE-2022-48667",
          "url": "https://bugzilla.suse.com/1223518"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-48667"
    },
    {
      "cve": "CVE-2022-48668",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-48668"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmb3: fix temporary data corruption in collapse range\n\ncollapse range doesn\u0027t discard the affected cached region\nso can risk temporarily corrupting the file data. This\nfixes xfstest generic/031\n\nI also decided to merge a minor cleanup to this into the same patch\n(avoiding rereading inode size repeatedly unnecessarily) to make it\nclearer.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-48668",
          "url": "https://www.suse.com/security/cve/CVE-2022-48668"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223516 for CVE-2022-48668",
          "url": "https://bugzilla.suse.com/1223516"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-48668"
    },
    {
      "cve": "CVE-2022-48671",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-48671"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncgroup: Add missing cpus_read_lock() to cgroup_attach_task_all()\n\nsyzbot is hitting percpu_rwsem_assert_held(\u0026cpu_hotplug_lock) warning at\ncpuset_attach() [1], for commit 4f7e7236435ca0ab (\"cgroup: Fix\nthreadgroup_rwsem \u003c-\u003e cpus_read_lock() deadlock\") missed that\ncpuset_attach() is also called from cgroup_attach_task_all().\nAdd cpus_read_lock() like what cgroup_procs_write_start() does.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-48671",
          "url": "https://www.suse.com/security/cve/CVE-2022-48671"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223929 for CVE-2022-48671",
          "url": "https://bugzilla.suse.com/1223929"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-48671"
    },
    {
      "cve": "CVE-2022-48672",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-48672"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nof: fdt: fix off-by-one error in unflatten_dt_nodes()\n\nCommit 78c44d910d3e (\"drivers/of: Fix depth when unflattening devicetree\")\nforgot to fix up the depth check in the loop body in unflatten_dt_nodes()\nwhich makes it possible to overflow the nps[] buffer...\n\nFound by Linux Verification Center (linuxtesting.org) with the SVACE static\nanalysis tool.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-48672",
          "url": "https://www.suse.com/security/cve/CVE-2022-48672"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223931 for CVE-2022-48672",
          "url": "https://bugzilla.suse.com/1223931"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-48672"
    },
    {
      "cve": "CVE-2022-48673",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-48673"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/smc: Fix possible access to freed memory in link clear\n\nAfter modifying the QP to the Error state, all RX WR would be completed\nwith WC in IB_WC_WR_FLUSH_ERR status. Current implementation does not\nwait for it is done, but destroy the QP and free the link group directly.\nSo there is a risk that accessing the freed memory in tasklet context.\n\nHere is a crash example:\n\n BUG: unable to handle page fault for address: ffffffff8f220860\n #PF: supervisor write access in kernel mode\n #PF: error_code(0x0002) - not-present page\n PGD f7300e067 P4D f7300e067 PUD f7300f063 PMD 8c4e45063 PTE 800ffff08c9df060\n Oops: 0002 [#1] SMP PTI\n CPU: 1 PID: 0 Comm: swapper/1 Kdump: loaded Tainted: G S         OE     5.10.0-0607+ #23\n Hardware name: Inspur NF5280M4/YZMB-00689-101, BIOS 4.1.20 07/09/2018\n RIP: 0010:native_queued_spin_lock_slowpath+0x176/0x1b0\n Code: f3 90 48 8b 32 48 85 f6 74 f6 eb d5 c1 ee 12 83 e0 03 83 ee 01 48 c1 e0 05 48 63 f6 48 05 00 c8 02 00 48 03 04 f5 00 09 98 8e \u003c48\u003e 89 10 8b 42 08 85 c0 75 09 f3 90 8b 42 08 85 c0 74 f7 48 8b 32\n RSP: 0018:ffffb3b6c001ebd8 EFLAGS: 00010086\n RAX: ffffffff8f220860 RBX: 0000000000000246 RCX: 0000000000080000\n RDX: ffff91db1f86c800 RSI: 000000000000173c RDI: ffff91db62bace00\n RBP: ffff91db62bacc00 R08: 0000000000000000 R09: c00000010000028b\n R10: 0000000000055198 R11: ffffb3b6c001ea58 R12: ffff91db80e05010\n R13: 000000000000000a R14: 0000000000000006 R15: 0000000000000040\n FS:  0000000000000000(0000) GS:ffff91db1f840000(0000) knlGS:0000000000000000\n CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n CR2: ffffffff8f220860 CR3: 00000001f9580004 CR4: 00000000003706e0\n DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\n Call Trace:\n  \u003cIRQ\u003e\n  _raw_spin_lock_irqsave+0x30/0x40\n  mlx5_ib_poll_cq+0x4c/0xc50 [mlx5_ib]\n  smc_wr_rx_tasklet_fn+0x56/0xa0 [smc]\n  tasklet_action_common.isra.21+0x66/0x100\n  __do_softirq+0xd5/0x29c\n  asm_call_irq_on_stack+0x12/0x20\n  \u003c/IRQ\u003e\n  do_softirq_own_stack+0x37/0x40\n  irq_exit_rcu+0x9d/0xa0\n  sysvec_call_function_single+0x34/0x80\n  asm_sysvec_call_function_single+0x12/0x20",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-48673",
          "url": "https://www.suse.com/security/cve/CVE-2022-48673"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223934 for CVE-2022-48673",
          "url": "https://bugzilla.suse.com/1223934"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223940 for CVE-2022-48673",
          "url": "https://bugzilla.suse.com/1223940"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-48673"
    },
    {
      "cve": "CVE-2022-48675",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-48675"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nIB/core: Fix a nested dead lock as part of ODP flow\n\nFix a nested dead lock as part of ODP flow by using mmput_async().\n\nFrom the below call trace [1] can see that calling mmput() once we have\nthe umem_odp-\u003eumem_mutex locked as required by\nib_umem_odp_map_dma_and_lock() might trigger in the same task the\nexit_mmap()-\u003e__mmu_notifier_release()-\u003emlx5_ib_invalidate_range() which\nmay dead lock when trying to lock the same mutex.\n\nMoving to use mmput_async() will solve the problem as the above\nexit_mmap() flow will be called in other task and will be executed once\nthe lock will be available.\n\n[1]\n[64843.077665] task:kworker/u133:2  state:D stack:    0 pid:80906 ppid:\n2 flags:0x00004000\n[64843.077672] Workqueue: mlx5_ib_page_fault mlx5_ib_eqe_pf_action [mlx5_ib]\n[64843.077719] Call Trace:\n[64843.077722]  \u003cTASK\u003e\n[64843.077724]  __schedule+0x23d/0x590\n[64843.077729]  schedule+0x4e/0xb0\n[64843.077735]  schedule_preempt_disabled+0xe/0x10\n[64843.077740]  __mutex_lock.constprop.0+0x263/0x490\n[64843.077747]  __mutex_lock_slowpath+0x13/0x20\n[64843.077752]  mutex_lock+0x34/0x40\n[64843.077758]  mlx5_ib_invalidate_range+0x48/0x270 [mlx5_ib]\n[64843.077808]  __mmu_notifier_release+0x1a4/0x200\n[64843.077816]  exit_mmap+0x1bc/0x200\n[64843.077822]  ? walk_page_range+0x9c/0x120\n[64843.077828]  ? __cond_resched+0x1a/0x50\n[64843.077833]  ? mutex_lock+0x13/0x40\n[64843.077839]  ? uprobe_clear_state+0xac/0x120\n[64843.077860]  mmput+0x5f/0x140\n[64843.077867]  ib_umem_odp_map_dma_and_lock+0x21b/0x580 [ib_core]\n[64843.077931]  pagefault_real_mr+0x9a/0x140 [mlx5_ib]\n[64843.077962]  pagefault_mr+0xb4/0x550 [mlx5_ib]\n[64843.077992]  pagefault_single_data_segment.constprop.0+0x2ac/0x560\n[mlx5_ib]\n[64843.078022]  mlx5_ib_eqe_pf_action+0x528/0x780 [mlx5_ib]\n[64843.078051]  process_one_work+0x22b/0x3d0\n[64843.078059]  worker_thread+0x53/0x410\n[64843.078065]  ? process_one_work+0x3d0/0x3d0\n[64843.078073]  kthread+0x12a/0x150\n[64843.078079]  ? set_kthread_struct+0x50/0x50\n[64843.078085]  ret_from_fork+0x22/0x30\n[64843.078093]  \u003c/TASK\u003e",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-48675",
          "url": "https://www.suse.com/security/cve/CVE-2022-48675"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223894 for CVE-2022-48675",
          "url": "https://bugzilla.suse.com/1223894"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-48675"
    },
    {
      "cve": "CVE-2022-48686",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-48686"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnvme-tcp: fix UAF when detecting digest errors\n\nWe should also bail from the io_work loop when we set rd_enabled to true,\nso we don\u0027t attempt to read data from the socket when the TCP stream is\nalready out-of-sync or corrupted.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-48686",
          "url": "https://www.suse.com/security/cve/CVE-2022-48686"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223948 for CVE-2022-48686",
          "url": "https://bugzilla.suse.com/1223948"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1226337 for CVE-2022-48686",
          "url": "https://bugzilla.suse.com/1226337"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "important"
        }
      ],
      "title": "CVE-2022-48686"
    },
    {
      "cve": "CVE-2022-48687",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-48687"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipv6: sr: fix out-of-bounds read when setting HMAC data.\n\nThe SRv6 layer allows defining HMAC data that can later be used to sign IPv6\nSegment Routing Headers. This configuration is realised via netlink through\nfour attributes: SEG6_ATTR_HMACKEYID, SEG6_ATTR_SECRET, SEG6_ATTR_SECRETLEN and\nSEG6_ATTR_ALGID. Because the SECRETLEN attribute is decoupled from the actual\nlength of the SECRET attribute, it is possible to provide invalid combinations\n(e.g., secret = \"\", secretlen = 64). This case is not checked in the code and\nwith an appropriately crafted netlink message, an out-of-bounds read of up\nto 64 bytes (max secret length) can occur past the skb end pointer and into\nskb_shared_info:\n\nBreakpoint 1, seg6_genl_sethmac (skb=\u003coptimized out\u003e, info=\u003coptimized out\u003e) at net/ipv6/seg6.c:208\n208\t\tmemcpy(hinfo-\u003esecret, secret, slen);\n(gdb) bt\n #0  seg6_genl_sethmac (skb=\u003coptimized out\u003e, info=\u003coptimized out\u003e) at net/ipv6/seg6.c:208\n #1  0xffffffff81e012e9 in genl_family_rcv_msg_doit (skb=skb@entry=0xffff88800b1f9f00, nlh=nlh@entry=0xffff88800b1b7600,\n    extack=extack@entry=0xffffc90000ba7af0, ops=ops@entry=0xffffc90000ba7a80, hdrlen=4, net=0xffffffff84237580 \u003cinit_net\u003e, family=\u003coptimized out\u003e,\n    family=\u003coptimized out\u003e) at net/netlink/genetlink.c:731\n #2  0xffffffff81e01435 in genl_family_rcv_msg (extack=0xffffc90000ba7af0, nlh=0xffff88800b1b7600, skb=0xffff88800b1f9f00,\n    family=0xffffffff82fef6c0 \u003cseg6_genl_family\u003e) at net/netlink/genetlink.c:775\n #3  genl_rcv_msg (skb=0xffff88800b1f9f00, nlh=0xffff88800b1b7600, extack=0xffffc90000ba7af0) at net/netlink/genetlink.c:792\n #4  0xffffffff81dfffc3 in netlink_rcv_skb (skb=skb@entry=0xffff88800b1f9f00, cb=cb@entry=0xffffffff81e01350 \u003cgenl_rcv_msg\u003e)\n    at net/netlink/af_netlink.c:2501\n #5  0xffffffff81e00919 in genl_rcv (skb=0xffff88800b1f9f00) at net/netlink/genetlink.c:803\n #6  0xffffffff81dff6ae in netlink_unicast_kernel (ssk=0xffff888010eec800, skb=0xffff88800b1f9f00, sk=0xffff888004aed000)\n    at net/netlink/af_netlink.c:1319\n #7  netlink_unicast (ssk=ssk@entry=0xffff888010eec800, skb=skb@entry=0xffff88800b1f9f00, portid=portid@entry=0, nonblock=\u003coptimized out\u003e)\n    at net/netlink/af_netlink.c:1345\n #8  0xffffffff81dff9a4 in netlink_sendmsg (sock=\u003coptimized out\u003e, msg=0xffffc90000ba7e48, len=\u003coptimized out\u003e) at net/netlink/af_netlink.c:1921\n...\n(gdb) p/x ((struct sk_buff *)0xffff88800b1f9f00)-\u003ehead + ((struct sk_buff *)0xffff88800b1f9f00)-\u003eend\n$1 = 0xffff88800b1b76c0\n(gdb) p/x secret\n$2 = 0xffff88800b1b76c0\n(gdb) p slen\n$3 = 64 \u0027@\u0027\n\nThe OOB data can then be read back from userspace by dumping HMAC state. This\ncommit fixes this by ensuring SECRETLEN cannot exceed the actual length of\nSECRET.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-48687",
          "url": "https://www.suse.com/security/cve/CVE-2022-48687"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223952 for CVE-2022-48687",
          "url": "https://bugzilla.suse.com/1223952"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1224043 for CVE-2022-48687",
          "url": "https://bugzilla.suse.com/1224043"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "important"
        }
      ],
      "title": "CVE-2022-48687"
    },
    {
      "cve": "CVE-2022-48688",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-48688"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ni40e: Fix kernel crash during module removal\n\nThe driver incorrectly frees client instance and subsequent\ni40e module removal leads to kernel crash.\n\nReproducer:\n1. Do ethtool offline test followed immediately by another one\nhost# ethtool -t eth0 offline; ethtool -t eth0 offline\n2. Remove recursively irdma module that also removes i40e module\nhost# modprobe -r irdma\n\nResult:\n[ 8675.035651] i40e 0000:3d:00.0 eno1: offline testing starting\n[ 8675.193774] i40e 0000:3d:00.0 eno1: testing finished\n[ 8675.201316] i40e 0000:3d:00.0 eno1: offline testing starting\n[ 8675.358921] i40e 0000:3d:00.0 eno1: testing finished\n[ 8675.496921] i40e 0000:3d:00.0: IRDMA hardware initialization FAILED init_state=2 status=-110\n[ 8686.188955] i40e 0000:3d:00.1: i40e_ptp_stop: removed PHC on eno2\n[ 8686.943890] i40e 0000:3d:00.1: Deleted LAN device PF1 bus=0x3d dev=0x00 func=0x01\n[ 8686.952669] i40e 0000:3d:00.0: i40e_ptp_stop: removed PHC on eno1\n[ 8687.761787] BUG: kernel NULL pointer dereference, address: 0000000000000030\n[ 8687.768755] #PF: supervisor read access in kernel mode\n[ 8687.773895] #PF: error_code(0x0000) - not-present page\n[ 8687.779034] PGD 0 P4D 0\n[ 8687.781575] Oops: 0000 [#1] PREEMPT SMP NOPTI\n[ 8687.785935] CPU: 51 PID: 172891 Comm: rmmod Kdump: loaded Tainted: G        W I        5.19.0+ #2\n[ 8687.794800] Hardware name: Intel Corporation S2600WFD/S2600WFD, BIOS SE5C620.86B.0X.02.0001.051420190324 05/14/2019\n[ 8687.805222] RIP: 0010:i40e_lan_del_device+0x13/0xb0 [i40e]\n[ 8687.810719] Code: d4 84 c0 0f 84 b8 25 01 00 e9 9c 25 01 00 41 bc f4 ff ff ff eb 91 90 0f 1f 44 00 00 41 54 55 53 48 8b 87 58 08 00 00 48 89 fb \u003c48\u003e 8b 68 30 48 89 ef e8 21 8a 0f d5 48 89 ef e8 a9 78 0f d5 48 8b\n[ 8687.829462] RSP: 0018:ffffa604072efce0 EFLAGS: 00010202\n[ 8687.834689] RAX: 0000000000000000 RBX: ffff8f43833b2000 RCX: 0000000000000000\n[ 8687.841821] RDX: 0000000000000000 RSI: ffff8f4b0545b298 RDI: ffff8f43833b2000\n[ 8687.848955] RBP: ffff8f43833b2000 R08: 0000000000000001 R09: 0000000000000000\n[ 8687.856086] R10: 0000000000000000 R11: 000ffffffffff000 R12: ffff8f43833b2ef0\n[ 8687.863218] R13: ffff8f43833b2ef0 R14: ffff915103966000 R15: ffff8f43833b2008\n[ 8687.870342] FS:  00007f79501c3740(0000) GS:ffff8f4adffc0000(0000) knlGS:0000000000000000\n[ 8687.878427] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[ 8687.884174] CR2: 0000000000000030 CR3: 000000014276e004 CR4: 00000000007706e0\n[ 8687.891306] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n[ 8687.898441] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\n[ 8687.905572] PKRU: 55555554\n[ 8687.908286] Call Trace:\n[ 8687.910737]  \u003cTASK\u003e\n[ 8687.912843]  i40e_remove+0x2c0/0x330 [i40e]\n[ 8687.917040]  pci_device_remove+0x33/0xa0\n[ 8687.920962]  device_release_driver_internal+0x1aa/0x230\n[ 8687.926188]  driver_detach+0x44/0x90\n[ 8687.929770]  bus_remove_driver+0x55/0xe0\n[ 8687.933693]  pci_unregister_driver+0x2a/0xb0\n[ 8687.937967]  i40e_exit_module+0xc/0xf48 [i40e]\n\nTwo offline tests cause IRDMA driver failure (ETIMEDOUT) and this\nfailure is indicated back to i40e_client_subtask() that calls\ni40e_client_del_instance() to free client instance referenced\nby pf-\u003ecinst and sets this pointer to NULL. During the module\nremoval i40e_remove() calls i40e_lan_del_device() that dereferences\npf-\u003ecinst that is NULL -\u003e crash.\nDo not remove client instance when client open callbacks fails and\njust clear __I40E_CLIENT_INSTANCE_OPENED bit. The driver also needs\nto take care about this situation (when netdev is up and client\nis NOT opened) in i40e_notify_client_of_netdev_close() and\ncalls client close callback only when __I40E_CLIENT_INSTANCE_OPENED\nis set.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-48688",
          "url": "https://www.suse.com/security/cve/CVE-2022-48688"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223953 for CVE-2022-48688",
          "url": "https://bugzilla.suse.com/1223953"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-48688"
    },
    {
      "cve": "CVE-2022-48690",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-48690"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nice: Fix DMA mappings leak\n\nFix leak, when user changes ring parameters.\nDuring reallocation of RX buffers, new DMA mappings are created for\nthose buffers. New buffers with different RX ring count should\nsubstitute older ones, but those buffers were freed in ice_vsi_cfg_rxq\nand reallocated again with ice_alloc_rx_buf. kfree on rx_buf caused\nleak of already mapped DMA.\nReallocate ZC with xdp_buf struct, when BPF program loads. Reallocate\nback to rx_buf, when BPF program unloads.\nIf BPF program is loaded/unloaded and XSK pools are created, reallocate\nRX queues accordingly in XDP_SETUP_XSK_POOL handler.\n\nSteps for reproduction:\nwhile :\ndo\n\tfor ((i=0; i\u003c=8160; i=i+32))\n\tdo\n\t\tethtool -G enp130s0f0 rx $i tx $i\n\t\tsleep 0.5\n\t\tethtool -g enp130s0f0\n\tdone\ndone",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-48690",
          "url": "https://www.suse.com/security/cve/CVE-2022-48690"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223960 for CVE-2022-48690",
          "url": "https://bugzilla.suse.com/1223960"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-48690"
    },
    {
      "cve": "CVE-2022-48692",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-48692"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/srp: Set scmnd-\u003eresult only when scmnd is not NULL\n\nThis change fixes the following kernel NULL pointer dereference\nwhich is reproduced by blktests srp/007 occasionally.\n\nBUG: kernel NULL pointer dereference, address: 0000000000000170\nPGD 0 P4D 0\nOops: 0002 [#1] PREEMPT SMP NOPTI\nCPU: 0 PID: 9 Comm: kworker/0:1H Kdump: loaded Not tainted 6.0.0-rc1+ #37\nHardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.15.0-29-g6a62e0cb0dfe-prebuilt.qemu.org 04/01/2014\nWorkqueue:  0x0 (kblockd)\nRIP: 0010:srp_recv_done+0x176/0x500 [ib_srp]\nCode: 00 4d 85 ff 0f 84 52 02 00 00 48 c7 82 80 02 00 00 00 00 00 00 4c 89 df 4c 89 14 24 e8 53 d3 4a f6 4c 8b 14 24 41 0f b6 42 13 \u003c41\u003e 89 87 70 01 00 00 41 0f b6 52 12 f6 c2 02 74 44 41 8b 42 1c b9\nRSP: 0018:ffffaef7c0003e28 EFLAGS: 00000282\nRAX: 0000000000000000 RBX: ffff9bc9486dea60 RCX: 0000000000000000\nRDX: 0000000000000102 RSI: ffffffffb76bbd0e RDI: 00000000ffffffff\nRBP: ffff9bc980099a00 R08: 0000000000000001 R09: 0000000000000001\nR10: ffff9bca53ef0000 R11: ffff9bc980099a10 R12: ffff9bc956e14000\nR13: ffff9bc9836b9cb0 R14: ffff9bc9557b4480 R15: 0000000000000000\nFS:  0000000000000000(0000) GS:ffff9bc97ec00000(0000) knlGS:0000000000000000\nCS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 0000000000000170 CR3: 0000000007e04000 CR4: 00000000000006f0\nCall Trace:\n \u003cIRQ\u003e\n __ib_process_cq+0xb7/0x280 [ib_core]\n ib_poll_handler+0x2b/0x130 [ib_core]\n irq_poll_softirq+0x93/0x150\n __do_softirq+0xee/0x4b8\n irq_exit_rcu+0xf7/0x130\n sysvec_apic_timer_interrupt+0x8e/0xc0\n \u003c/IRQ\u003e",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-48692",
          "url": "https://www.suse.com/security/cve/CVE-2022-48692"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223962 for CVE-2022-48692",
          "url": "https://bugzilla.suse.com/1223962"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-48692"
    },
    {
      "cve": "CVE-2022-48693",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-48693"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsoc: brcmstb: pm-arm: Fix refcount leak and __iomem leak bugs\n\nIn brcmstb_pm_probe(), there are two kinds of leak bugs:\n\n(1) we need to add of_node_put() when for_each__matching_node() breaks\n(2) we need to add iounmap() for each iomap in fail path",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-48693",
          "url": "https://www.suse.com/security/cve/CVE-2022-48693"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223963 for CVE-2022-48693",
          "url": "https://bugzilla.suse.com/1223963"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-48693"
    },
    {
      "cve": "CVE-2022-48694",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-48694"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/irdma: Fix drain SQ hang with no completion\n\nSW generated completions for outstanding WRs posted on SQ\nafter QP is in error target the wrong CQ. This causes the\nib_drain_sq to hang with no completion.\n\nFix this to generate completions on the right CQ.\n\n[  863.969340] INFO: task kworker/u52:2:671 blocked for more than 122 seconds.\n[  863.979224]       Not tainted 5.14.0-130.el9.x86_64 #1\n[  863.986588] \"echo 0 \u003e /proc/sys/kernel/hung_task_timeout_secs\" disables this message.\n[  863.996997] task:kworker/u52:2   state:D stack:    0 pid:  671 ppid:     2 flags:0x00004000\n[  864.007272] Workqueue: xprtiod xprt_autoclose [sunrpc]\n[  864.014056] Call Trace:\n[  864.017575]  __schedule+0x206/0x580\n[  864.022296]  schedule+0x43/0xa0\n[  864.026736]  schedule_timeout+0x115/0x150\n[  864.032185]  __wait_for_common+0x93/0x1d0\n[  864.037717]  ? usleep_range_state+0x90/0x90\n[  864.043368]  __ib_drain_sq+0xf6/0x170 [ib_core]\n[  864.049371]  ? __rdma_block_iter_next+0x80/0x80 [ib_core]\n[  864.056240]  ib_drain_sq+0x66/0x70 [ib_core]\n[  864.062003]  rpcrdma_xprt_disconnect+0x82/0x3b0 [rpcrdma]\n[  864.069365]  ? xprt_prepare_transmit+0x5d/0xc0 [sunrpc]\n[  864.076386]  xprt_rdma_close+0xe/0x30 [rpcrdma]\n[  864.082593]  xprt_autoclose+0x52/0x100 [sunrpc]\n[  864.088718]  process_one_work+0x1e8/0x3c0\n[  864.094170]  worker_thread+0x50/0x3b0\n[  864.099109]  ? rescuer_thread+0x370/0x370\n[  864.104473]  kthread+0x149/0x170\n[  864.109022]  ? set_kthread_struct+0x40/0x40\n[  864.114713]  ret_from_fork+0x22/0x30",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-48694",
          "url": "https://www.suse.com/security/cve/CVE-2022-48694"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223964 for CVE-2022-48694",
          "url": "https://bugzilla.suse.com/1223964"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-48694"
    },
    {
      "cve": "CVE-2022-48695",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-48695"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: mpt3sas: Fix use-after-free warning\n\nFix the following use-after-free warning which is observed during\ncontroller reset:\n\nrefcount_t: underflow; use-after-free.\nWARNING: CPU: 23 PID: 5399 at lib/refcount.c:28 refcount_warn_saturate+0xa6/0xf0",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-48695",
          "url": "https://www.suse.com/security/cve/CVE-2022-48695"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223941 for CVE-2022-48695",
          "url": "https://bugzilla.suse.com/1223941"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-48695"
    },
    {
      "cve": "CVE-2022-48697",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-48697"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnvmet: fix a use-after-free\n\nFix the following use-after-free complaint triggered by blktests nvme/004:\n\nBUG: KASAN: user-memory-access in blk_mq_complete_request_remote+0xac/0x350\nRead of size 4 at addr 0000607bd1835943 by task kworker/13:1/460\nWorkqueue: nvmet-wq nvme_loop_execute_work [nvme_loop]\nCall Trace:\n show_stack+0x52/0x58\n dump_stack_lvl+0x49/0x5e\n print_report.cold+0x36/0x1e2\n kasan_report+0xb9/0xf0\n __asan_load4+0x6b/0x80\n blk_mq_complete_request_remote+0xac/0x350\n nvme_loop_queue_response+0x1df/0x275 [nvme_loop]\n __nvmet_req_complete+0x132/0x4f0 [nvmet]\n nvmet_req_complete+0x15/0x40 [nvmet]\n nvmet_execute_io_connect+0x18a/0x1f0 [nvmet]\n nvme_loop_execute_work+0x20/0x30 [nvme_loop]\n process_one_work+0x56e/0xa70\n worker_thread+0x2d1/0x640\n kthread+0x183/0x1c0\n ret_from_fork+0x1f/0x30",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-48697",
          "url": "https://www.suse.com/security/cve/CVE-2022-48697"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223922 for CVE-2022-48697",
          "url": "https://bugzilla.suse.com/1223922"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-48697"
    },
    {
      "cve": "CVE-2022-48698",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-48698"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/display: fix memory leak when using debugfs_lookup()\n\nWhen calling debugfs_lookup() the result must have dput() called on it,\notherwise the memory will leak over time.  Fix this up by properly\ncalling dput().",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-48698",
          "url": "https://www.suse.com/security/cve/CVE-2022-48698"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223956 for CVE-2022-48698",
          "url": "https://bugzilla.suse.com/1223956"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "low"
        }
      ],
      "title": "CVE-2022-48698"
    },
    {
      "cve": "CVE-2022-48700",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-48700"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-48700",
          "url": "https://www.suse.com/security/cve/CVE-2022-48700"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223957 for CVE-2022-48700",
          "url": "https://bugzilla.suse.com/1223957"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "low"
        }
      ],
      "title": "CVE-2022-48700"
    },
    {
      "cve": "CVE-2022-48701",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-48701"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: usb-audio: Fix an out-of-bounds bug in __snd_usb_parse_audio_interface()\n\nThere may be a bad USB audio device with a USB ID of (0x04fa, 0x4201) and\nthe number of it\u0027s interfaces less than 4, an out-of-bounds read bug occurs\nwhen parsing the interface descriptor for this device.\n\nFix this by checking the number of interfaces.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-48701",
          "url": "https://www.suse.com/security/cve/CVE-2022-48701"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223921 for CVE-2022-48701",
          "url": "https://bugzilla.suse.com/1223921"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "low"
        }
      ],
      "title": "CVE-2022-48701"
    },
    {
      "cve": "CVE-2022-48702",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-48702"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: emu10k1: Fix out of bounds access in snd_emu10k1_pcm_channel_alloc()\n\nThe voice allocator sometimes begins allocating from near the end of the\narray and then wraps around, however snd_emu10k1_pcm_channel_alloc()\naccesses the newly allocated voices as if it never wrapped around.\n\nThis results in out of bounds access if the first voice has a high enough\nindex so that first_voice + requested_voice_count \u003e NUM_G (64).\nThe more voices are requested, the more likely it is for this to occur.\n\nThis was initially discovered using PipeWire, however it can be reproduced\nby calling aplay multiple times with 16 channels:\naplay -r 48000 -D plughw:CARD=Live,DEV=3 -c 16 /dev/zero\n\nUBSAN: array-index-out-of-bounds in sound/pci/emu10k1/emupcm.c:127:40\nindex 65 is out of range for type \u0027snd_emu10k1_voice [64]\u0027\nCPU: 1 PID: 31977 Comm: aplay Tainted: G        W IOE      6.0.0-rc2-emu10k1+ #7\nHardware name: ASUSTEK COMPUTER INC P5W DH Deluxe/P5W DH Deluxe, BIOS 3002    07/22/2010\nCall Trace:\n\u003cTASK\u003e\ndump_stack_lvl+0x49/0x63\ndump_stack+0x10/0x16\nubsan_epilogue+0x9/0x3f\n__ubsan_handle_out_of_bounds.cold+0x44/0x49\nsnd_emu10k1_playback_hw_params+0x3bc/0x420 [snd_emu10k1]\nsnd_pcm_hw_params+0x29f/0x600 [snd_pcm]\nsnd_pcm_common_ioctl+0x188/0x1410 [snd_pcm]\n? exit_to_user_mode_prepare+0x35/0x170\n? do_syscall_64+0x69/0x90\n? syscall_exit_to_user_mode+0x26/0x50\n? do_syscall_64+0x69/0x90\n? exit_to_user_mode_prepare+0x35/0x170\nsnd_pcm_ioctl+0x27/0x40 [snd_pcm]\n__x64_sys_ioctl+0x95/0xd0\ndo_syscall_64+0x5c/0x90\n? do_syscall_64+0x69/0x90\n? do_syscall_64+0x69/0x90\nentry_SYSCALL_64_after_hwframe+0x63/0xcd",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-48702",
          "url": "https://www.suse.com/security/cve/CVE-2022-48702"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223923 for CVE-2022-48702",
          "url": "https://bugzilla.suse.com/1223923"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-48702"
    },
    {
      "cve": "CVE-2022-48703",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-48703"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nthermal/int340x_thermal: handle data_vault when the value is ZERO_SIZE_PTR\n\nIn some case, the GDDV returns a package with a buffer which has\nzero length. It causes that kmemdup() returns ZERO_SIZE_PTR (0x10).\n\nThen the data_vault_read() got NULL point dereference problem when\naccessing the 0x10 value in data_vault.\n\n[   71.024560] BUG: kernel NULL pointer dereference, address:\n0000000000000010\n\nThis patch uses ZERO_OR_NULL_PTR() for checking ZERO_SIZE_PTR or\nNULL value in data_vault.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-48703",
          "url": "https://www.suse.com/security/cve/CVE-2022-48703"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223924 for CVE-2022-48703",
          "url": "https://bugzilla.suse.com/1223924"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-48703"
    },
    {
      "cve": "CVE-2022-48704",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-48704"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/radeon: add a force flush to delay work when radeon\n\nAlthough radeon card fence and wait for gpu to finish processing current batch rings,\nthere is still a corner case that radeon lockup work queue may not be fully flushed,\nand meanwhile the radeon_suspend_kms() function has called pci_set_power_state() to\nput device in D3hot state.\nPer PCI spec rev 4.0 on 5.3.1.4.1 D3hot State.\n\u003e Configuration and Message requests are the only TLPs accepted by a Function in\n\u003e the D3hot state. All other received Requests must be handled as Unsupported Requests,\n\u003e and all received Completions may optionally be handled as Unexpected Completions.\nThis issue will happen in following logs:\nUnable to handle kernel paging request at virtual address 00008800e0008010\nCPU 0 kworker/0:3(131): Oops 0\npc = [\u003cffffffff811bea5c\u003e]  ra = [\u003cffffffff81240844\u003e]  ps = 0000 Tainted: G        W\npc is at si_gpu_check_soft_reset+0x3c/0x240\nra is at si_dma_is_lockup+0x34/0xd0\nv0 = 0000000000000000  t0 = fff08800e0008010  t1 = 0000000000010000\nt2 = 0000000000008010  t3 = fff00007e3c00000  t4 = fff00007e3c00258\nt5 = 000000000000ffff  t6 = 0000000000000001  t7 = fff00007ef078000\ns0 = fff00007e3c016e8  s1 = fff00007e3c00000  s2 = fff00007e3c00018\ns3 = fff00007e3c00000  s4 = fff00007fff59d80  s5 = 0000000000000000\ns6 = fff00007ef07bd98\na0 = fff00007e3c00000  a1 = fff00007e3c016e8  a2 = 0000000000000008\na3 = 0000000000000001  a4 = 8f5c28f5c28f5c29  a5 = ffffffff810f4338\nt8 = 0000000000000275  t9 = ffffffff809b66f8  t10 = ff6769c5d964b800\nt11= 000000000000b886  pv = ffffffff811bea20  at = 0000000000000000\ngp = ffffffff81d89690  sp = 00000000aa814126\nDisabling lock debugging due to kernel taint\nTrace:\n[\u003cffffffff81240844\u003e] si_dma_is_lockup+0x34/0xd0\n[\u003cffffffff81119610\u003e] radeon_fence_check_lockup+0xd0/0x290\n[\u003cffffffff80977010\u003e] process_one_work+0x280/0x550\n[\u003cffffffff80977350\u003e] worker_thread+0x70/0x7c0\n[\u003cffffffff80977410\u003e] worker_thread+0x130/0x7c0\n[\u003cffffffff80982040\u003e] kthread+0x200/0x210\n[\u003cffffffff809772e0\u003e] worker_thread+0x0/0x7c0\n[\u003cffffffff80981f8c\u003e] kthread+0x14c/0x210\n[\u003cffffffff80911658\u003e] ret_from_kernel_thread+0x18/0x20\n[\u003cffffffff80981e40\u003e] kthread+0x0/0x210\n Code: ad3e0008  43f0074a  ad7e0018  ad9e0020  8c3001e8  40230101\n \u003c88210000\u003e 4821ed21\nSo force lockup work queue flush to fix this problem.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-48704",
          "url": "https://www.suse.com/security/cve/CVE-2022-48704"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223932 for CVE-2022-48704",
          "url": "https://bugzilla.suse.com/1223932"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-48704"
    },
    {
      "cve": "CVE-2023-2860",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-2860"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An out-of-bounds read vulnerability was found in the SR-IPv6 implementation in the Linux kernel. The flaw exists within the processing of seg6 attributes. The issue results from the improper validation of user-supplied data, which can result in a read past the end of an allocated buffer. This flaw allows a privileged local user to disclose sensitive information on affected installations of the Linux kernel.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-2860",
          "url": "https://www.suse.com/security/cve/CVE-2023-2860"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1211592 for CVE-2023-2860",
          "url": "https://bugzilla.suse.com/1211592"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-2860"
    },
    {
      "cve": "CVE-2023-52488",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-52488"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nserial: sc16is7xx: convert from _raw_ to _noinc_ regmap functions for FIFO\n\nThe SC16IS7XX IC supports a burst mode to access the FIFOs where the\ninitial register address is sent ($00), followed by all the FIFO data\nwithout having to resend the register address each time. In this mode, the\nIC doesn\u0027t increment the register address for each R/W byte.\n\nThe regmap_raw_read() and regmap_raw_write() are functions which can\nperform IO over multiple registers. They are currently used to read/write\nfrom/to the FIFO, and although they operate correctly in this burst mode on\nthe SPI bus, they would corrupt the regmap cache if it was not disabled\nmanually. The reason is that when the R/W size is more than 1 byte, these\nfunctions assume that the register address is incremented and handle the\ncache accordingly.\n\nConvert FIFO R/W functions to use the regmap _noinc_ versions in order to\nremove the manual cache control which was a workaround when using the\n_raw_ versions. FIFO registers are properly declared as volatile so\ncache will not be used/updated for FIFO accesses.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-52488",
          "url": "https://www.suse.com/security/cve/CVE-2023-52488"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1221162 for CVE-2023-52488",
          "url": "https://bugzilla.suse.com/1221162"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-52488"
    },
    {
      "cve": "CVE-2023-52503",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-52503"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntee: amdtee: fix use-after-free vulnerability in amdtee_close_session\n\nThere is a potential race condition in amdtee_close_session that may\ncause use-after-free in amdtee_open_session. For instance, if a session\nhas refcount == 1, and one thread tries to free this session via:\n\n    kref_put(\u0026sess-\u003erefcount, destroy_session);\n\nthe reference count will get decremented, and the next step would be to\ncall destroy_session(). However, if in another thread,\namdtee_open_session() is called before destroy_session() has completed\nexecution, alloc_session() may return \u0027sess\u0027 that will be freed up\nlater in destroy_session() leading to use-after-free in\namdtee_open_session.\n\nTo fix this issue, treat decrement of sess-\u003erefcount and removal of\n\u0027sess\u0027 from session list in destroy_session() as a critical section, so\nthat it is executed atomically.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-52503",
          "url": "https://www.suse.com/security/cve/CVE-2023-52503"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1220915 for CVE-2023-52503",
          "url": "https://bugzilla.suse.com/1220915"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-52503"
    },
    {
      "cve": "CVE-2023-52561",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-52561"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\narm64: dts: qcom: sdm845-db845c: Mark cont splash memory region as reserved\n\nAdding a reserved memory region for the framebuffer memory\n(the splash memory region set up by the bootloader).\n\nIt fixes a kernel panic (arm-smmu: Unhandled context fault\nat this particular memory region) reported on DB845c running\nv5.10.y.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-52561",
          "url": "https://www.suse.com/security/cve/CVE-2023-52561"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1220935 for CVE-2023-52561",
          "url": "https://bugzilla.suse.com/1220935"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-52561"
    },
    {
      "cve": "CVE-2023-52585",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-52585"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amdgpu: Fix possible NULL dereference in amdgpu_ras_query_error_status_helper()\n\nReturn invalid error code -EINVAL for invalid block id.\n\nFixes the below:\n\ndrivers/gpu/drm/amd/amdgpu/amdgpu_ras.c:1183 amdgpu_ras_query_error_status_helper() error: we previously assumed \u0027info\u0027 could be null (see line 1176)",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-52585",
          "url": "https://www.suse.com/security/cve/CVE-2023-52585"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1221080 for CVE-2023-52585",
          "url": "https://bugzilla.suse.com/1221080"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-52585"
    },
    {
      "cve": "CVE-2023-52589",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-52589"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: rkisp1: Fix IRQ disable race issue\n\nIn rkisp1_isp_stop() and rkisp1_csi_disable() the driver masks the\ninterrupts and then apparently assumes that the interrupt handler won\u0027t\nbe running, and proceeds in the stop procedure. This is not the case, as\nthe interrupt handler can already be running, which would lead to the\nISP being disabled while the interrupt handler handling a captured\nframe.\n\nThis brings up two issues: 1) the ISP could be powered off while the\ninterrupt handler is still running and accessing registers, leading to\nboard lockup, and 2) the interrupt handler code and the code that\ndisables the streaming might do things that conflict.\n\nIt is not clear to me if 2) causes a real issue, but 1) can be seen with\na suitable delay (or printk in my case) in the interrupt handler,\nleading to board lockup.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-52589",
          "url": "https://www.suse.com/security/cve/CVE-2023-52589"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1221084 for CVE-2023-52589",
          "url": "https://bugzilla.suse.com/1221084"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-52589"
    },
    {
      "cve": "CVE-2023-52590",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-52590"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nocfs2: Avoid touching renamed directory if parent does not change\n\nThe VFS will not be locking moved directory if its parent does not\nchange. Change ocfs2 rename code to avoid touching renamed directory if\nits parent does not change as without locking that can corrupt the\nfilesystem.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-52590",
          "url": "https://www.suse.com/security/cve/CVE-2023-52590"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1221088 for CVE-2023-52590",
          "url": "https://bugzilla.suse.com/1221088"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-52590"
    },
    {
      "cve": "CVE-2023-52591",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-52591"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nreiserfs: Avoid touching renamed directory if parent does not change\n\nThe VFS will not be locking moved directory if its parent does not\nchange. Change reiserfs rename code to avoid touching renamed directory\nif its parent does not change as without locking that can corrupt the\nfilesystem.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-52591",
          "url": "https://www.suse.com/security/cve/CVE-2023-52591"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1221044 for CVE-2023-52591",
          "url": "https://bugzilla.suse.com/1221044"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1221578 for CVE-2023-52591",
          "url": "https://bugzilla.suse.com/1221578"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1221598 for CVE-2023-52591",
          "url": "https://bugzilla.suse.com/1221598"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "important"
        }
      ],
      "title": "CVE-2023-52591"
    },
    {
      "cve": "CVE-2023-52593",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-52593"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: wfx: fix possible NULL pointer dereference in wfx_set_mfp_ap()\n\nSince \u0027ieee80211_beacon_get()\u0027 can return NULL, \u0027wfx_set_mfp_ap()\u0027\nshould check the return value before examining skb data. So convert\nthe latter to return an appropriate error code and propagate it to\nreturn from \u0027wfx_start_ap()\u0027 as well. Compile tested only.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-52593",
          "url": "https://www.suse.com/security/cve/CVE-2023-52593"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1221042 for CVE-2023-52593",
          "url": "https://bugzilla.suse.com/1221042"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-52593"
    },
    {
      "cve": "CVE-2023-52614",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-52614"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nPM / devfreq: Fix buffer overflow in trans_stat_show\n\nFix buffer overflow in trans_stat_show().\n\nConvert simple snprintf to the more secure scnprintf with size of\nPAGE_SIZE.\n\nAdd condition checking if we are exceeding PAGE_SIZE and exit early from\nloop. Also add at the end a warning that we exceeded PAGE_SIZE and that\nstats is disabled.\n\nReturn -EFBIG in the case where we don\u0027t have enough space to write the\nfull transition table.\n\nAlso document in the ABI that this function can return -EFBIG error.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-52614",
          "url": "https://www.suse.com/security/cve/CVE-2023-52614"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1221617 for CVE-2023-52614",
          "url": "https://bugzilla.suse.com/1221617"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-52614"
    },
    {
      "cve": "CVE-2023-52616",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-52616"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: lib/mpi - Fix unexpected pointer access in mpi_ec_init\n\nWhen the mpi_ec_ctx structure is initialized, some fields are not\ncleared, causing a crash when referencing the field when the\nstructure was released. Initially, this issue was ignored because\nmemory for mpi_ec_ctx is allocated with the __GFP_ZERO flag.\nFor example, this error will be triggered when calculating the\nZa value for SM2 separately.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-52616",
          "url": "https://www.suse.com/security/cve/CVE-2023-52616"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1221612 for CVE-2023-52616",
          "url": "https://bugzilla.suse.com/1221612"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-52616"
    },
    {
      "cve": "CVE-2023-52620",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-52620"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nf_tables: disallow timeout for anonymous sets\n\nNever used from userspace, disallow these parameters.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-52620",
          "url": "https://www.suse.com/security/cve/CVE-2023-52620"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1221825 for CVE-2023-52620",
          "url": "https://bugzilla.suse.com/1221825"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-52620"
    },
    {
      "cve": "CVE-2023-52627",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-52627"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\niio: adc: ad7091r: Allow users to configure device events\n\nAD7091R-5 devices are supported by the ad7091r-5 driver together with\nthe ad7091r-base driver. Those drivers declared iio events for notifying\nuser space when ADC readings fall bellow the thresholds of low limit\nregisters or above the values set in high limit registers.\nHowever, to configure iio events and their thresholds, a set of callback\nfunctions must be implemented and those were not present until now.\nThe consequence of trying to configure ad7091r-5 events without the\nproper callback functions was a null pointer dereference in the kernel\nbecause the pointers to the callback functions were not set.\n\nImplement event configuration callbacks allowing users to read/write\nevent thresholds and enable/disable event generation.\n\nSince the event spec structs are generic to AD7091R devices, also move\nthose from the ad7091r-5 driver the base driver so they can be reused\nwhen support for ad7091r-2/-4/-8 be added.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-52627",
          "url": "https://www.suse.com/security/cve/CVE-2023-52627"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222051 for CVE-2023-52627",
          "url": "https://bugzilla.suse.com/1222051"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-52627"
    },
    {
      "cve": "CVE-2023-52635",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-52635"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nPM / devfreq: Synchronize devfreq_monitor_[start/stop]\n\nThere is a chance if a frequent switch of the governor\ndone in a loop result in timer list corruption where\ntimer cancel being done from two place one from\ncancel_delayed_work_sync() and followed by expire_timers()\ncan be seen from the traces[1].\n\nwhile true\ndo\n        echo \"simple_ondemand\" \u003e /sys/class/devfreq/1d84000.ufshc/governor\n        echo \"performance\" \u003e /sys/class/devfreq/1d84000.ufshc/governor\ndone\n\nIt looks to be issue with devfreq driver where\ndevice_monitor_[start/stop] need to synchronized so that\ndelayed work should get corrupted while it is either\nbeing queued or running or being cancelled.\n\nLet\u0027s use polling flag and devfreq lock to synchronize the\nqueueing the timer instance twice and work data being\ncorrupted.\n\n[1]\n...\n..\n\u003cidle\u003e-0    [003]   9436.209662:  timer_cancel   timer=0xffffff80444f0428\n\u003cidle\u003e-0    [003]   9436.209664:  timer_expire_entry   timer=0xffffff80444f0428  now=0x10022da1c  function=__typeid__ZTSFvP10timer_listE_global_addr  baseclk=0x10022da1c\n\u003cidle\u003e-0    [003]   9436.209718:  timer_expire_exit   timer=0xffffff80444f0428\nkworker/u16:6-14217    [003]   9436.209863:  timer_start   timer=0xffffff80444f0428  function=__typeid__ZTSFvP10timer_listE_global_addr  expires=0x10022da2b  now=0x10022da1c  flags=182452227\nvendor.xxxyyy.ha-1593    [004]   9436.209888:  timer_cancel   timer=0xffffff80444f0428\nvendor.xxxyyy.ha-1593    [004]   9436.216390:  timer_init   timer=0xffffff80444f0428\nvendor.xxxyyy.ha-1593    [004]   9436.216392:  timer_start   timer=0xffffff80444f0428  function=__typeid__ZTSFvP10timer_listE_global_addr  expires=0x10022da2c  now=0x10022da1d  flags=186646532\nvendor.xxxyyy.ha-1593    [005]   9436.220992:  timer_cancel   timer=0xffffff80444f0428\nxxxyyyTraceManag-7795    [004]   9436.261641:  timer_cancel   timer=0xffffff80444f0428\n\n[2]\n\n 9436.261653][    C4] Unable to handle kernel paging request at virtual address dead00000000012a\n[ 9436.261664][    C4] Mem abort info:\n[ 9436.261666][    C4]   ESR = 0x96000044\n[ 9436.261669][    C4]   EC = 0x25: DABT (current EL), IL = 32 bits\n[ 9436.261671][    C4]   SET = 0, FnV = 0\n[ 9436.261673][    C4]   EA = 0, S1PTW = 0\n[ 9436.261675][    C4] Data abort info:\n[ 9436.261677][    C4]   ISV = 0, ISS = 0x00000044\n[ 9436.261680][    C4]   CM = 0, WnR = 1\n[ 9436.261682][    C4] [dead00000000012a] address between user and kernel address ranges\n[ 9436.261685][    C4] Internal error: Oops: 96000044 [#1] PREEMPT SMP\n[ 9436.261701][    C4] Skip md ftrace buffer dump for: 0x3a982d0\n...\n\n[ 9436.262138][    C4] CPU: 4 PID: 7795 Comm: TraceManag Tainted: G S      W  O      5.10.149-android12-9-o-g17f915d29d0c #1\n[ 9436.262141][    C4] Hardware name: Qualcomm Technologies, Inc.  (DT)\n[ 9436.262144][    C4] pstate: 22400085 (nzCv daIf +PAN -UAO +TCO BTYPE=--)\n[ 9436.262161][    C4] pc : expire_timers+0x9c/0x438\n[ 9436.262164][    C4] lr : expire_timers+0x2a4/0x438\n[ 9436.262168][    C4] sp : ffffffc010023dd0\n[ 9436.262171][    C4] x29: ffffffc010023df0 x28: ffffffd0636fdc18\n[ 9436.262178][    C4] x27: ffffffd063569dd0 x26: ffffffd063536008\n[ 9436.262182][    C4] x25: 0000000000000001 x24: ffffff88f7c69280\n[ 9436.262185][    C4] x23: 00000000000000e0 x22: dead000000000122\n[ 9436.262188][    C4] x21: 000000010022da29 x20: ffffff8af72b4e80\n[ 9436.262191][    C4] x19: ffffffc010023e50 x18: ffffffc010025038\n[ 9436.262195][    C4] x17: 0000000000000240 x16: 0000000000000201\n[ 9436.262199][    C4] x15: ffffffffffffffff x14: ffffff889f3c3100\n[ 9436.262203][    C4] x13: ffffff889f3c3100 x12: 00000000049f56b8\n[ 9436.262207][    C4] x11: 00000000049f56b8 x10: 00000000ffffffff\n[ 9436.262212][    C4] x9 : ffffffc010023e50 x8 : dead000000000122\n[ 9436.262216][    C4] x7 : ffffffffffffffff x6 : ffffffc0100239d8\n[ 9436.262220][    C4] x5 : 0000000000000000 x4 : 0000000000000101\n[ 9436.262223][    C4] x3 : 0000000000000080 x2 : ffffff8\n---truncated---",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-52635",
          "url": "https://www.suse.com/security/cve/CVE-2023-52635"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222294 for CVE-2023-52635",
          "url": "https://bugzilla.suse.com/1222294"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-52635"
    },
    {
      "cve": "CVE-2023-52636",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-52636"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nlibceph: just wait for more data to be available on the socket\n\nA short read may occur while reading the message footer from the\nsocket.  Later, when the socket is ready for another read, the\nmessenger invokes all read_partial_*() handlers, including\nread_partial_sparse_msg_data().  The expectation is that\nread_partial_sparse_msg_data() would bail, allowing the messenger to\ninvoke read_partial() for the footer and pick up where it left off.\n\nHowever read_partial_sparse_msg_data() violates that and ends up\ncalling into the state machine in the OSD client.  The sparse-read\nstate machine assumes that it\u0027s a new op and interprets some piece of\nthe footer as the sparse-read header and returns bogus extents/data\nlength, etc.\n\nTo determine whether read_partial_sparse_msg_data() should bail, let\u0027s\nreuse cursor-\u003etotal_resid.  Because once it reaches to zero that means\nall the extents and data have been successfully received in last read,\nelse it could break out when partially reading any of the extents and\ndata.  And then osd_sparse_read() could continue where it left off.\n\n[ idryomov: changelog ]",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-52636",
          "url": "https://www.suse.com/security/cve/CVE-2023-52636"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222247 for CVE-2023-52636",
          "url": "https://bugzilla.suse.com/1222247"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-52636"
    },
    {
      "cve": "CVE-2023-52645",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-52645"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\npmdomain: mediatek: fix race conditions with genpd\n\nIf the power domains are registered first with genpd and *after that*\nthe driver attempts to power them on in the probe sequence, then it is\npossible that a race condition occurs if genpd tries to power them on\nin the same time.\nThe same is valid for powering them off before unregistering them\nfrom genpd.\nAttempt to fix race conditions by first removing the domains from genpd\nand *after that* powering down domains.\nAlso first power up the domains and *after that* register them\nto genpd.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-52645",
          "url": "https://www.suse.com/security/cve/CVE-2023-52645"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223033 for CVE-2023-52645",
          "url": "https://bugzilla.suse.com/1223033"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-52645"
    },
    {
      "cve": "CVE-2023-52652",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-52652"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nNTB: fix possible name leak in ntb_register_device()\n\nIf device_register() fails in ntb_register_device(), the device name\nallocated by dev_set_name() should be freed. As per the comment in\ndevice_register(), callers should use put_device() to give up the\nreference in the error path. So fix this by calling put_device() in the\nerror path so that the name can be freed in kobject_cleanup().\n\nAs a result of this, put_device() in the error path of\nntb_register_device() is removed and the actual error is returned.\n\n[mani: reworded commit message]",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-52652",
          "url": "https://www.suse.com/security/cve/CVE-2023-52652"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223686 for CVE-2023-52652",
          "url": "https://bugzilla.suse.com/1223686"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "low"
        }
      ],
      "title": "CVE-2023-52652"
    },
    {
      "cve": "CVE-2023-6270",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-6270"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A flaw was found in the ATA over Ethernet (AoE) driver in the Linux kernel. The aoecmd_cfg_pkts() function improperly updates the refcnt on `struct net_device`, and a use-after-free can be triggered by racing between the free on the struct and the access through the `skbtxq` global queue. This could lead to a denial of service condition or potential code execution.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-6270",
          "url": "https://www.suse.com/security/cve/CVE-2023-6270"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1218562 for CVE-2023-6270",
          "url": "https://bugzilla.suse.com/1218562"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1218813 for CVE-2023-6270",
          "url": "https://bugzilla.suse.com/1218813"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1221578 for CVE-2023-6270",
          "url": "https://bugzilla.suse.com/1221578"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1221598 for CVE-2023-6270",
          "url": "https://bugzilla.suse.com/1221598"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223016 for CVE-2023-6270",
          "url": "https://bugzilla.suse.com/1223016"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1227675 for CVE-2023-6270",
          "url": "https://bugzilla.suse.com/1227675"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-6270"
    },
    {
      "cve": "CVE-2024-0639",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-0639"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A denial of service vulnerability due to a deadlock was found in sctp_auto_asconf_init in net/sctp/socket.c in the Linux kernel\u0027s SCTP subsystem. This flaw allows guests with local user privileges to trigger a deadlock and potentially crash the system.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-0639",
          "url": "https://www.suse.com/security/cve/CVE-2024-0639"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1218917 for CVE-2024-0639",
          "url": "https://bugzilla.suse.com/1218917"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-0639"
    },
    {
      "cve": "CVE-2024-0841",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-0841"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A null pointer dereference flaw was found in the hugetlbfs_fill_super function in the Linux kernel hugetlbfs (HugeTLB pages) functionality. This issue may allow a local user to crash the system or potentially escalate their privileges on the system.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-0841",
          "url": "https://www.suse.com/security/cve/CVE-2024-0841"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1219264 for CVE-2024-0841",
          "url": "https://bugzilla.suse.com/1219264"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-0841"
    },
    {
      "cve": "CVE-2024-22099",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-22099"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "NULL Pointer Dereference vulnerability in Linux Linux kernel kernel on Linux, x86, ARM (net, bluetooth modules) allows Overflow Buffers. This vulnerability is associated with program files /net/bluetooth/rfcomm/core.C.\n\nThis issue affects Linux kernel: v2.6.12-rc2.\n\n",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-22099",
          "url": "https://www.suse.com/security/cve/CVE-2024-22099"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1219170 for CVE-2024-22099",
          "url": "https://bugzilla.suse.com/1219170"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-22099"
    },
    {
      "cve": "CVE-2024-23307",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-23307"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Integer Overflow or Wraparound vulnerability in Linux Linux kernel kernel on Linux, x86, ARM (md, raid, raid5 modules) allows Forced Integer Overflow.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-23307",
          "url": "https://www.suse.com/security/cve/CVE-2024-23307"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1219169 for CVE-2024-23307",
          "url": "https://bugzilla.suse.com/1219169"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1220145 for CVE-2024-23307",
          "url": "https://bugzilla.suse.com/1220145"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "important"
        }
      ],
      "title": "CVE-2024-23307"
    },
    {
      "cve": "CVE-2024-23848",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-23848"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel through 6.7.1, there is a use-after-free in cec_queue_msg_fh, related to drivers/media/cec/core/cec-adap.c and drivers/media/cec/core/cec-api.c.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-23848",
          "url": "https://www.suse.com/security/cve/CVE-2024-23848"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1219104 for CVE-2024-23848",
          "url": "https://bugzilla.suse.com/1219104"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-23848"
    },
    {
      "cve": "CVE-2024-23850",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-23850"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In btrfs_get_root_ref in fs/btrfs/disk-io.c in the Linux kernel through 6.7.1, there can be an assertion failure and crash because a subvolume can be read out too soon after its root item is inserted upon subvolume creation.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-23850",
          "url": "https://www.suse.com/security/cve/CVE-2024-23850"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1219126 for CVE-2024-23850",
          "url": "https://bugzilla.suse.com/1219126"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-23850"
    },
    {
      "cve": "CVE-2024-26601",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26601"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\next4: regenerate buddy after block freeing failed if under fc replay\n\nThis mostly reverts commit 6bd97bf273bd (\"ext4: remove redundant\nmb_regenerate_buddy()\") and reintroduces mb_regenerate_buddy(). Based on\ncode in mb_free_blocks(), fast commit replay can end up marking as free\nblocks that are already marked as such. This causes corruption of the\nbuddy bitmap so we need to regenerate it in that case.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26601",
          "url": "https://www.suse.com/security/cve/CVE-2024-26601"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1220342 for CVE-2024-26601",
          "url": "https://bugzilla.suse.com/1220342"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26601"
    },
    {
      "cve": "CVE-2024-26610",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26610"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: iwlwifi: fix a memory corruption\n\niwl_fw_ini_trigger_tlv::data is a pointer to a __le32, which means that\nif we copy to iwl_fw_ini_trigger_tlv::data + offset while offset is in\nbytes, we\u0027ll write past the buffer.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26610",
          "url": "https://www.suse.com/security/cve/CVE-2024-26610"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1221299 for CVE-2024-26610",
          "url": "https://bugzilla.suse.com/1221299"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1221302 for CVE-2024-26610",
          "url": "https://bugzilla.suse.com/1221302"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "important"
        }
      ],
      "title": "CVE-2024-26610"
    },
    {
      "cve": "CVE-2024-26656",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26656"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amdgpu: fix use-after-free bug\n\nThe bug can be triggered by sending a single amdgpu_gem_userptr_ioctl\nto the AMDGPU DRM driver on any ASICs with an invalid address and size.\nThe bug was reported by Joonkyo Jung \u003cjoonkyoj@yonsei.ac.kr\u003e.\nFor example the following code:\n\nstatic void Syzkaller1(int fd)\n{\n\tstruct drm_amdgpu_gem_userptr arg;\n\tint ret;\n\n\targ.addr = 0xffffffffffff0000;\n\targ.size = 0x80000000; /*2 Gb*/\n\targ.flags = 0x7;\n\tret = drmIoctl(fd, 0xc1186451/*amdgpu_gem_userptr_ioctl*/, \u0026arg);\n}\n\nDue to the address and size are not valid there is a failure in\namdgpu_hmm_register-\u003emmu_interval_notifier_insert-\u003e__mmu_interval_notifier_insert-\u003e\ncheck_shl_overflow, but we even the amdgpu_hmm_register failure we still call\namdgpu_hmm_unregister into  amdgpu_gem_object_free which causes access to a bad address.\nThe following stack is below when the issue is reproduced when Kazan is enabled:\n\n[  +0.000014] Hardware name: ASUS System Product Name/ROG STRIX B550-F GAMING (WI-FI), BIOS 1401 12/03/2020\n[  +0.000009] RIP: 0010:mmu_interval_notifier_remove+0x327/0x340\n[  +0.000017] Code: ff ff 49 89 44 24 08 48 b8 00 01 00 00 00 00 ad de 4c 89 f7 49 89 47 40 48 83 c0 22 49 89 47 48 e8 ce d1 2d 01 e9 32 ff ff ff \u003c0f\u003e 0b e9 16 ff ff ff 4c 89 ef e8 fa 14 b3 ff e9 36 ff ff ff e8 80\n[  +0.000014] RSP: 0018:ffffc90002657988 EFLAGS: 00010246\n[  +0.000013] RAX: 0000000000000000 RBX: 1ffff920004caf35 RCX: ffffffff8160565b\n[  +0.000011] RDX: dffffc0000000000 RSI: 0000000000000004 RDI: ffff8881a9f78260\n[  +0.000010] RBP: ffffc90002657a70 R08: 0000000000000001 R09: fffff520004caf25\n[  +0.000010] R10: 0000000000000003 R11: ffffffff8161d1d6 R12: ffff88810e988c00\n[  +0.000010] R13: ffff888126fb5a00 R14: ffff88810e988c0c R15: ffff8881a9f78260\n[  +0.000011] FS:  00007ff9ec848540(0000) GS:ffff8883cc880000(0000) knlGS:0000000000000000\n[  +0.000012] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[  +0.000010] CR2: 000055b3f7e14328 CR3: 00000001b5770000 CR4: 0000000000350ef0\n[  +0.000010] Call Trace:\n[  +0.000006]  \u003cTASK\u003e\n[  +0.000007]  ? show_regs+0x6a/0x80\n[  +0.000018]  ? __warn+0xa5/0x1b0\n[  +0.000019]  ? mmu_interval_notifier_remove+0x327/0x340\n[  +0.000018]  ? report_bug+0x24a/0x290\n[  +0.000022]  ? handle_bug+0x46/0x90\n[  +0.000015]  ? exc_invalid_op+0x19/0x50\n[  +0.000016]  ? asm_exc_invalid_op+0x1b/0x20\n[  +0.000017]  ? kasan_save_stack+0x26/0x50\n[  +0.000017]  ? mmu_interval_notifier_remove+0x23b/0x340\n[  +0.000019]  ? mmu_interval_notifier_remove+0x327/0x340\n[  +0.000019]  ? mmu_interval_notifier_remove+0x23b/0x340\n[  +0.000020]  ? __pfx_mmu_interval_notifier_remove+0x10/0x10\n[  +0.000017]  ? kasan_save_alloc_info+0x1e/0x30\n[  +0.000018]  ? srso_return_thunk+0x5/0x5f\n[  +0.000014]  ? __kasan_kmalloc+0xb1/0xc0\n[  +0.000018]  ? srso_return_thunk+0x5/0x5f\n[  +0.000013]  ? __kasan_check_read+0x11/0x20\n[  +0.000020]  amdgpu_hmm_unregister+0x34/0x50 [amdgpu]\n[  +0.004695]  amdgpu_gem_object_free+0x66/0xa0 [amdgpu]\n[  +0.004534]  ? __pfx_amdgpu_gem_object_free+0x10/0x10 [amdgpu]\n[  +0.004291]  ? do_syscall_64+0x5f/0xe0\n[  +0.000023]  ? srso_return_thunk+0x5/0x5f\n[  +0.000017]  drm_gem_object_free+0x3b/0x50 [drm]\n[  +0.000489]  amdgpu_gem_userptr_ioctl+0x306/0x500 [amdgpu]\n[  +0.004295]  ? __pfx_amdgpu_gem_userptr_ioctl+0x10/0x10 [amdgpu]\n[  +0.004270]  ? srso_return_thunk+0x5/0x5f\n[  +0.000014]  ? __this_cpu_preempt_check+0x13/0x20\n[  +0.000015]  ? srso_return_thunk+0x5/0x5f\n[  +0.000013]  ? sysvec_apic_timer_interrupt+0x57/0xc0\n[  +0.000020]  ? srso_return_thunk+0x5/0x5f\n[  +0.000014]  ? asm_sysvec_apic_timer_interrupt+0x1b/0x20\n[  +0.000022]  ? drm_ioctl_kernel+0x17b/0x1f0 [drm]\n[  +0.000496]  ? __pfx_amdgpu_gem_userptr_ioctl+0x10/0x10 [amdgpu]\n[  +0.004272]  ? drm_ioctl_kernel+0x190/0x1f0 [drm]\n[  +0.000492]  drm_ioctl_kernel+0x140/0x1f0 [drm]\n[  +0.000497]  ? __pfx_amdgpu_gem_userptr_ioctl+0x10/0x10 [amdgpu]\n[  +0.004297]  ? __pfx_drm_ioctl_kernel+0x10/0x10 [d\n---truncated---",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26656",
          "url": "https://www.suse.com/security/cve/CVE-2024-26656"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222307 for CVE-2024-26656",
          "url": "https://bugzilla.suse.com/1222307"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26656"
    },
    {
      "cve": "CVE-2024-26660",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26660"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/display: Implement bounds check for stream encoder creation in DCN301\n\n\u0027stream_enc_regs\u0027 array is an array of dcn10_stream_enc_registers\nstructures. The array is initialized with four elements, corresponding\nto the four calls to stream_enc_regs() in the array initializer. This\nmeans that valid indices for this array are 0, 1, 2, and 3.\n\nThe error message \u0027stream_enc_regs\u0027 4 \u003c= 5 below, is indicating that\nthere is an attempt to access this array with an index of 5, which is\nout of bounds. This could lead to undefined behavior\n\nHere, eng_id is used as an index to access the stream_enc_regs array. If\neng_id is 5, this would result in an out-of-bounds access on the\nstream_enc_regs array.\n\nThus fixing Buffer overflow error in dcn301_stream_encoder_create\nreported by Smatch:\ndrivers/gpu/drm/amd/amdgpu/../display/dc/resource/dcn301/dcn301_resource.c:1011 dcn301_stream_encoder_create() error: buffer overflow \u0027stream_enc_regs\u0027 4 \u003c= 5",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26660",
          "url": "https://www.suse.com/security/cve/CVE-2024-26660"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222266 for CVE-2024-26660",
          "url": "https://bugzilla.suse.com/1222266"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26660"
    },
    {
      "cve": "CVE-2024-26671",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26671"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nblk-mq: fix IO hang from sbitmap wakeup race\n\nIn blk_mq_mark_tag_wait(), __add_wait_queue() may be re-ordered\nwith the following blk_mq_get_driver_tag() in case of getting driver\ntag failure.\n\nThen in __sbitmap_queue_wake_up(), waitqueue_active() may not observe\nthe added waiter in blk_mq_mark_tag_wait() and wake up nothing, meantime\nblk_mq_mark_tag_wait() can\u0027t get driver tag successfully.\n\nThis issue can be reproduced by running the following test in loop, and\nfio hang can be observed in \u003c 30min when running it on my test VM\nin laptop.\n\n\tmodprobe -r scsi_debug\n\tmodprobe scsi_debug delay=0 dev_size_mb=4096 max_queue=1 host_max_queue=1 submit_queues=4\n\tdev=`ls -d /sys/bus/pseudo/drivers/scsi_debug/adapter*/host*/target*/*/block/* | head -1 | xargs basename`\n\tfio --filename=/dev/\"$dev\" --direct=1 --rw=randrw --bs=4k --iodepth=1 \\\n       \t\t--runtime=100 --numjobs=40 --time_based --name=test \\\n        \t--ioengine=libaio\n\nFix the issue by adding one explicit barrier in blk_mq_mark_tag_wait(), which\nis just fine in case of running out of tag.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26671",
          "url": "https://www.suse.com/security/cve/CVE-2024-26671"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222357 for CVE-2024-26671",
          "url": "https://bugzilla.suse.com/1222357"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26671"
    },
    {
      "cve": "CVE-2024-26673",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26673"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nft_ct: sanitize layer 3 and 4 protocol number in custom expectations\n\n- Disallow families other than NFPROTO_{IPV4,IPV6,INET}.\n- Disallow layer 4 protocol with no ports, since destination port is a\n  mandatory attribute for this object.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26673",
          "url": "https://www.suse.com/security/cve/CVE-2024-26673"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222368 for CVE-2024-26673",
          "url": "https://bugzilla.suse.com/1222368"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26673"
    },
    {
      "cve": "CVE-2024-26675",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26675"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nppp_async: limit MRU to 64K\n\nsyzbot triggered a warning [1] in __alloc_pages():\n\nWARN_ON_ONCE_GFP(order \u003e MAX_PAGE_ORDER, gfp)\n\nWillem fixed a similar issue in commit c0a2a1b0d631 (\"ppp: limit MRU to 64K\")\n\nAdopt the same sanity check for ppp_async_ioctl(PPPIOCSMRU)\n\n[1]:\n\n WARNING: CPU: 1 PID: 11 at mm/page_alloc.c:4543 __alloc_pages+0x308/0x698 mm/page_alloc.c:4543\nModules linked in:\nCPU: 1 PID: 11 Comm: kworker/u4:0 Not tainted 6.8.0-rc2-syzkaller-g41bccc98fb79 #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023\nWorkqueue: events_unbound flush_to_ldisc\npstate: 204000c5 (nzCv daIF +PAN -UAO -TCO -DIT -SSBS BTYPE=--)\n pc : __alloc_pages+0x308/0x698 mm/page_alloc.c:4543\n lr : __alloc_pages+0xc8/0x698 mm/page_alloc.c:4537\nsp : ffff800093967580\nx29: ffff800093967660 x28: ffff8000939675a0 x27: dfff800000000000\nx26: ffff70001272ceb4 x25: 0000000000000000 x24: ffff8000939675c0\nx23: 0000000000000000 x22: 0000000000060820 x21: 1ffff0001272ceb8\nx20: ffff8000939675e0 x19: 0000000000000010 x18: ffff800093967120\nx17: ffff800083bded5c x16: ffff80008ac97500 x15: 0000000000000005\nx14: 1ffff0001272cebc x13: 0000000000000000 x12: 0000000000000000\nx11: ffff70001272cec1 x10: 1ffff0001272cec0 x9 : 0000000000000001\nx8 : ffff800091c91000 x7 : 0000000000000000 x6 : 000000000000003f\nx5 : 00000000ffffffff x4 : 0000000000000000 x3 : 0000000000000020\nx2 : 0000000000000008 x1 : 0000000000000000 x0 : ffff8000939675e0\nCall trace:\n  __alloc_pages+0x308/0x698 mm/page_alloc.c:4543\n  __alloc_pages_node include/linux/gfp.h:238 [inline]\n  alloc_pages_node include/linux/gfp.h:261 [inline]\n  __kmalloc_large_node+0xbc/0x1fc mm/slub.c:3926\n  __do_kmalloc_node mm/slub.c:3969 [inline]\n  __kmalloc_node_track_caller+0x418/0x620 mm/slub.c:4001\n  kmalloc_reserve+0x17c/0x23c net/core/skbuff.c:590\n  __alloc_skb+0x1c8/0x3d8 net/core/skbuff.c:651\n  __netdev_alloc_skb+0xb8/0x3e8 net/core/skbuff.c:715\n  netdev_alloc_skb include/linux/skbuff.h:3235 [inline]\n  dev_alloc_skb include/linux/skbuff.h:3248 [inline]\n  ppp_async_input drivers/net/ppp/ppp_async.c:863 [inline]\n  ppp_asynctty_receive+0x588/0x186c drivers/net/ppp/ppp_async.c:341\n  tty_ldisc_receive_buf+0x12c/0x15c drivers/tty/tty_buffer.c:390\n  tty_port_default_receive_buf+0x74/0xac drivers/tty/tty_port.c:37\n  receive_buf drivers/tty/tty_buffer.c:444 [inline]\n  flush_to_ldisc+0x284/0x6e4 drivers/tty/tty_buffer.c:494\n  process_one_work+0x694/0x1204 kernel/workqueue.c:2633\n  process_scheduled_works kernel/workqueue.c:2706 [inline]\n  worker_thread+0x938/0xef4 kernel/workqueue.c:2787\n  kthread+0x288/0x310 kernel/kthread.c:388\n  ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:860",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26675",
          "url": "https://www.suse.com/security/cve/CVE-2024-26675"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222379 for CVE-2024-26675",
          "url": "https://bugzilla.suse.com/1222379"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26675"
    },
    {
      "cve": "CVE-2024-26680",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26680"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: atlantic: Fix DMA mapping for PTP hwts ring\n\nFunction aq_ring_hwts_rx_alloc() maps extra AQ_CFG_RXDS_DEF bytes\nfor PTP HWTS ring but then generic aq_ring_free() does not take this\ninto account.\nCreate and use a specific function to free HWTS ring to fix this\nissue.\n\nTrace:\n[  215.351607] ------------[ cut here ]------------\n[  215.351612] DMA-API: atlantic 0000:4b:00.0: device driver frees DMA memory with different size [device address=0x00000000fbdd0000] [map size=34816 bytes] [unmap size=32768 bytes]\n[  215.351635] WARNING: CPU: 33 PID: 10759 at kernel/dma/debug.c:988 check_unmap+0xa6f/0x2360\n...\n[  215.581176] Call Trace:\n[  215.583632]  \u003cTASK\u003e\n[  215.585745]  ? show_trace_log_lvl+0x1c4/0x2df\n[  215.590114]  ? show_trace_log_lvl+0x1c4/0x2df\n[  215.594497]  ? debug_dma_free_coherent+0x196/0x210\n[  215.599305]  ? check_unmap+0xa6f/0x2360\n[  215.603147]  ? __warn+0xca/0x1d0\n[  215.606391]  ? check_unmap+0xa6f/0x2360\n[  215.610237]  ? report_bug+0x1ef/0x370\n[  215.613921]  ? handle_bug+0x3c/0x70\n[  215.617423]  ? exc_invalid_op+0x14/0x50\n[  215.621269]  ? asm_exc_invalid_op+0x16/0x20\n[  215.625480]  ? check_unmap+0xa6f/0x2360\n[  215.629331]  ? mark_lock.part.0+0xca/0xa40\n[  215.633445]  debug_dma_free_coherent+0x196/0x210\n[  215.638079]  ? __pfx_debug_dma_free_coherent+0x10/0x10\n[  215.643242]  ? slab_free_freelist_hook+0x11d/0x1d0\n[  215.648060]  dma_free_attrs+0x6d/0x130\n[  215.651834]  aq_ring_free+0x193/0x290 [atlantic]\n[  215.656487]  aq_ptp_ring_free+0x67/0x110 [atlantic]\n...\n[  216.127540] ---[ end trace 6467e5964dd2640b ]---\n[  216.132160] DMA-API: Mapped at:\n[  216.132162]  debug_dma_alloc_coherent+0x66/0x2f0\n[  216.132165]  dma_alloc_attrs+0xf5/0x1b0\n[  216.132168]  aq_ring_hwts_rx_alloc+0x150/0x1f0 [atlantic]\n[  216.132193]  aq_ptp_ring_alloc+0x1bb/0x540 [atlantic]\n[  216.132213]  aq_nic_init+0x4a1/0x760 [atlantic]",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26680",
          "url": "https://www.suse.com/security/cve/CVE-2024-26680"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222427 for CVE-2024-26680",
          "url": "https://bugzilla.suse.com/1222427"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26680"
    },
    {
      "cve": "CVE-2024-26681",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26681"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetdevsim: avoid potential loop in nsim_dev_trap_report_work()\n\nMany syzbot reports include the following trace [1]\n\nIf nsim_dev_trap_report_work() can not grab the mutex,\nit should rearm itself at least one jiffie later.\n\n[1]\nSending NMI from CPU 1 to CPUs 0:\nNMI backtrace for cpu 0\nCPU: 0 PID: 32383 Comm: kworker/0:2 Not tainted 6.8.0-rc2-syzkaller-00031-g861c0981648f #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023\nWorkqueue: events nsim_dev_trap_report_work\n RIP: 0010:bytes_is_nonzero mm/kasan/generic.c:89 [inline]\n RIP: 0010:memory_is_nonzero mm/kasan/generic.c:104 [inline]\n RIP: 0010:memory_is_poisoned_n mm/kasan/generic.c:129 [inline]\n RIP: 0010:memory_is_poisoned mm/kasan/generic.c:161 [inline]\n RIP: 0010:check_region_inline mm/kasan/generic.c:180 [inline]\n RIP: 0010:kasan_check_range+0x101/0x190 mm/kasan/generic.c:189\nCode: 07 49 39 d1 75 0a 45 3a 11 b8 01 00 00 00 7c 0b 44 89 c2 e8 21 ed ff ff 83 f0 01 5b 5d 41 5c c3 48 85 d2 74 4f 48 01 ea eb 09 \u003c48\u003e 83 c0 01 48 39 d0 74 41 80 38 00 74 f2 eb b6 41 bc 08 00 00 00\nRSP: 0018:ffffc90012dcf998 EFLAGS: 00000046\nRAX: fffffbfff258af1e RBX: fffffbfff258af1f RCX: ffffffff8168eda3\nRDX: fffffbfff258af1f RSI: 0000000000000004 RDI: ffffffff92c578f0\nRBP: fffffbfff258af1e R08: 0000000000000000 R09: fffffbfff258af1e\nR10: ffffffff92c578f3 R11: ffffffff8acbcbc0 R12: 0000000000000002\nR13: ffff88806db38400 R14: 1ffff920025b9f42 R15: ffffffff92c578e8\nFS:  0000000000000000(0000) GS:ffff8880b9800000(0000) knlGS:0000000000000000\nCS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 000000c00994e078 CR3: 000000002c250000 CR4: 00000000003506f0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\nCall Trace:\n \u003cNMI\u003e\n \u003c/NMI\u003e\n \u003cTASK\u003e\n  instrument_atomic_read include/linux/instrumented.h:68 [inline]\n  atomic_read include/linux/atomic/atomic-instrumented.h:32 [inline]\n  queued_spin_is_locked include/asm-generic/qspinlock.h:57 [inline]\n  debug_spin_unlock kernel/locking/spinlock_debug.c:101 [inline]\n  do_raw_spin_unlock+0x53/0x230 kernel/locking/spinlock_debug.c:141\n  __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:150 [inline]\n  _raw_spin_unlock_irqrestore+0x22/0x70 kernel/locking/spinlock.c:194\n  debug_object_activate+0x349/0x540 lib/debugobjects.c:726\n  debug_work_activate kernel/workqueue.c:578 [inline]\n  insert_work+0x30/0x230 kernel/workqueue.c:1650\n  __queue_work+0x62e/0x11d0 kernel/workqueue.c:1802\n  __queue_delayed_work+0x1bf/0x270 kernel/workqueue.c:1953\n  queue_delayed_work_on+0x106/0x130 kernel/workqueue.c:1989\n  queue_delayed_work include/linux/workqueue.h:563 [inline]\n  schedule_delayed_work include/linux/workqueue.h:677 [inline]\n  nsim_dev_trap_report_work+0x9c0/0xc80 drivers/net/netdevsim/dev.c:842\n  process_one_work+0x886/0x15d0 kernel/workqueue.c:2633\n  process_scheduled_works kernel/workqueue.c:2706 [inline]\n  worker_thread+0x8b9/0x1290 kernel/workqueue.c:2787\n  kthread+0x2c6/0x3a0 kernel/kthread.c:388\n  ret_from_fork+0x45/0x80 arch/x86/kernel/process.c:147\n  ret_from_fork_asm+0x11/0x20 arch/x86/entry/entry_64.S:242\n \u003c/TASK\u003e",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26681",
          "url": "https://www.suse.com/security/cve/CVE-2024-26681"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222431 for CVE-2024-26681",
          "url": "https://bugzilla.suse.com/1222431"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26681"
    },
    {
      "cve": "CVE-2024-26684",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26684"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: stmmac: xgmac: fix handling of DPP safety error for DMA channels\n\nCommit 56e58d6c8a56 (\"net: stmmac: Implement Safety Features in\nXGMAC core\") checks and reports safety errors, but leaves the\nData Path Parity Errors for each channel in DMA unhandled at all, lead to\na storm of interrupt.\nFix it by checking and clearing the DMA_DPP_Interrupt_Status register.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26684",
          "url": "https://www.suse.com/security/cve/CVE-2024-26684"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222445 for CVE-2024-26684",
          "url": "https://bugzilla.suse.com/1222445"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26684"
    },
    {
      "cve": "CVE-2024-26685",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26685"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnilfs2: fix potential bug in end_buffer_async_write\n\nAccording to a syzbot report, end_buffer_async_write(), which handles the\ncompletion of block device writes, may detect abnormal condition of the\nbuffer async_write flag and cause a BUG_ON failure when using nilfs2.\n\nNilfs2 itself does not use end_buffer_async_write().  But, the async_write\nflag is now used as a marker by commit 7f42ec394156 (\"nilfs2: fix issue\nwith race condition of competition between segments for dirty blocks\") as\na means of resolving double list insertion of dirty blocks in\nnilfs_lookup_dirty_data_buffers() and nilfs_lookup_node_buffers() and the\nresulting crash.\n\nThis modification is safe as long as it is used for file data and b-tree\nnode blocks where the page caches are independent.  However, it was\nirrelevant and redundant to also introduce async_write for segment summary\nand super root blocks that share buffers with the backing device.  This\nled to the possibility that the BUG_ON check in end_buffer_async_write\nwould fail as described above, if independent writebacks of the backing\ndevice occurred in parallel.\n\nThe use of async_write for segment summary buffers has already been\nremoved in a previous change.\n\nFix this issue by removing the manipulation of the async_write flag for\nthe remaining super root block buffer.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26685",
          "url": "https://www.suse.com/security/cve/CVE-2024-26685"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222437 for CVE-2024-26685",
          "url": "https://bugzilla.suse.com/1222437"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26685"
    },
    {
      "cve": "CVE-2024-26687",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26687"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nxen/events: close evtchn after mapping cleanup\n\nshutdown_pirq and startup_pirq are not taking the\nirq_mapping_update_lock because they can\u0027t due to lock inversion. Both\nare called with the irq_desc-\u003elock being taking. The lock order,\nhowever, is first irq_mapping_update_lock and then irq_desc-\u003elock.\n\nThis opens multiple races:\n- shutdown_pirq can be interrupted by a function that allocates an event\n  channel:\n\n  CPU0                        CPU1\n  shutdown_pirq {\n    xen_evtchn_close(e)\n                              __startup_pirq {\n                                EVTCHNOP_bind_pirq\n                                  -\u003e returns just freed evtchn e\n                                set_evtchn_to_irq(e, irq)\n                              }\n    xen_irq_info_cleanup() {\n      set_evtchn_to_irq(e, -1)\n    }\n  }\n\n  Assume here event channel e refers here to the same event channel\n  number.\n  After this race the evtchn_to_irq mapping for e is invalid (-1).\n\n- __startup_pirq races with __unbind_from_irq in a similar way. Because\n  __startup_pirq doesn\u0027t take irq_mapping_update_lock it can grab the\n  evtchn that __unbind_from_irq is currently freeing and cleaning up. In\n  this case even though the event channel is allocated, its mapping can\n  be unset in evtchn_to_irq.\n\nThe fix is to first cleanup the mappings and then close the event\nchannel. In this way, when an event channel gets allocated it\u0027s\npotential previous evtchn_to_irq mappings are guaranteed to be unset already.\nThis is also the reverse order of the allocation where first the event\nchannel is allocated and then the mappings are setup.\n\nOn a 5.10 kernel prior to commit 3fcdaf3d7634 (\"xen/events: modify internal\n[un]bind interfaces\"), we hit a BUG like the following during probing of NVMe\ndevices. The issue is that during nvme_setup_io_queues, pci_free_irq\nis called for every device which results in a call to shutdown_pirq.\nWith many nvme devices it\u0027s therefore likely to hit this race during\nboot because there will be multiple calls to shutdown_pirq and\nstartup_pirq are running potentially in parallel.\n\n  ------------[ cut here ]------------\n  blkfront: xvda: barrier or flush: disabled; persistent grants: enabled; indirect descriptors: enabled; bounce buffer: enabled\n  kernel BUG at drivers/xen/events/events_base.c:499!\n  invalid opcode: 0000 [#1] SMP PTI\n  CPU: 44 PID: 375 Comm: kworker/u257:23 Not tainted 5.10.201-191.748.amzn2.x86_64 #1\n  Hardware name: Xen HVM domU, BIOS 4.11.amazon 08/24/2006\n  Workqueue: nvme-reset-wq nvme_reset_work\n  RIP: 0010:bind_evtchn_to_cpu+0xdf/0xf0\n  Code: 5d 41 5e c3 cc cc cc cc 44 89 f7 e8 2b 55 ad ff 49 89 c5 48 85 c0 0f 84 64 ff ff ff 4c 8b 68 30 41 83 fe ff 0f 85 60 ff ff ff \u003c0f\u003e 0b 66 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 0f 1f 44 00 00\n  RSP: 0000:ffffc9000d533b08 EFLAGS: 00010046\n  RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000006\n  RDX: 0000000000000028 RSI: 00000000ffffffff RDI: 00000000ffffffff\n  RBP: ffff888107419680 R08: 0000000000000000 R09: ffffffff82d72b00\n  R10: 0000000000000000 R11: 0000000000000000 R12: 00000000000001ed\n  R13: 0000000000000000 R14: 00000000ffffffff R15: 0000000000000002\n  FS:  0000000000000000(0000) GS:ffff88bc8b500000(0000) knlGS:0000000000000000\n  CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n  CR2: 0000000000000000 CR3: 0000000002610001 CR4: 00000000001706e0\n  DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n  DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\n  Call Trace:\n   ? show_trace_log_lvl+0x1c1/0x2d9\n   ? show_trace_log_lvl+0x1c1/0x2d9\n   ? set_affinity_irq+0xdc/0x1c0\n   ? __die_body.cold+0x8/0xd\n   ? die+0x2b/0x50\n   ? do_trap+0x90/0x110\n   ? bind_evtchn_to_cpu+0xdf/0xf0\n   ? do_error_trap+0x65/0x80\n   ? bind_evtchn_to_cpu+0xdf/0xf0\n   ? exc_invalid_op+0x4e/0x70\n   ? bind_evtchn_to_cpu+0xdf/0xf0\n   ? asm_exc_invalid_op+0x12/0x20\n   ? bind_evtchn_to_cpu+0xdf/0x\n---truncated---",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26687",
          "url": "https://www.suse.com/security/cve/CVE-2024-26687"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222435 for CVE-2024-26687",
          "url": "https://bugzilla.suse.com/1222435"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26687"
    },
    {
      "cve": "CVE-2024-26688",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26688"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfs,hugetlb: fix NULL pointer dereference in hugetlbs_fill_super\n\nWhen configuring a hugetlb filesystem via the fsconfig() syscall, there is\na possible NULL dereference in hugetlbfs_fill_super() caused by assigning\nNULL to ctx-\u003ehstate in hugetlbfs_parse_param() when the requested pagesize\nis non valid.\n\nE.g: Taking the following steps:\n\n     fd = fsopen(\"hugetlbfs\", FSOPEN_CLOEXEC);\n     fsconfig(fd, FSCONFIG_SET_STRING, \"pagesize\", \"1024\", 0);\n     fsconfig(fd, FSCONFIG_CMD_CREATE, NULL, NULL, 0);\n\nGiven that the requested \"pagesize\" is invalid, ctxt-\u003ehstate will be replaced\nwith NULL, losing its previous value, and we will print an error:\n\n ...\n ...\n case Opt_pagesize:\n ps = memparse(param-\u003estring, \u0026rest);\n ctx-\u003ehstate = h;\n if (!ctx-\u003ehstate) {\n         pr_err(\"Unsupported page size %lu MB\\n\", ps / SZ_1M);\n         return -EINVAL;\n }\n return 0;\n ...\n ...\n\nThis is a problem because later on, we will dereference ctxt-\u003ehstate in\nhugetlbfs_fill_super()\n\n ...\n ...\n sb-\u003es_blocksize = huge_page_size(ctx-\u003ehstate);\n ...\n ...\n\nCausing below Oops.\n\nFix this by replacing cxt-\u003ehstate value only when then pagesize is known\nto be valid.\n\n kernel: hugetlbfs: Unsupported page size 0 MB\n kernel: BUG: kernel NULL pointer dereference, address: 0000000000000028\n kernel: #PF: supervisor read access in kernel mode\n kernel: #PF: error_code(0x0000) - not-present page\n kernel: PGD 800000010f66c067 P4D 800000010f66c067 PUD 1b22f8067 PMD 0\n kernel: Oops: 0000 [#1] PREEMPT SMP PTI\n kernel: CPU: 4 PID: 5659 Comm: syscall Tainted: G            E      6.8.0-rc2-default+ #22 5a47c3fef76212addcc6eb71344aabc35190ae8f\n kernel: Hardware name: Intel Corp. GROVEPORT/GROVEPORT, BIOS GVPRCRB1.86B.0016.D04.1705030402 05/03/2017\n kernel: RIP: 0010:hugetlbfs_fill_super+0xb4/0x1a0\n kernel: Code: 48 8b 3b e8 3e c6 ed ff 48 85 c0 48 89 45 20 0f 84 d6 00 00 00 48 b8 ff ff ff ff ff ff ff 7f 4c 89 e7 49 89 44 24 20 48 8b 03 \u003c8b\u003e 48 28 b8 00 10 00 00 48 d3 e0 49 89 44 24 18 48 8b 03 8b 40 28\n kernel: RSP: 0018:ffffbe9960fcbd48 EFLAGS: 00010246\n kernel: RAX: 0000000000000000 RBX: ffff9af5272ae780 RCX: 0000000000372004\n kernel: RDX: ffffffffffffffff RSI: ffffffffffffffff RDI: ffff9af555e9b000\n kernel: RBP: ffff9af52ee66b00 R08: 0000000000000040 R09: 0000000000370004\n kernel: R10: ffffbe9960fcbd48 R11: 0000000000000040 R12: ffff9af555e9b000\n kernel: R13: ffffffffa66b86c0 R14: ffff9af507d2f400 R15: ffff9af507d2f400\n kernel: FS:  00007ffbc0ba4740(0000) GS:ffff9b0bd7000000(0000) knlGS:0000000000000000\n kernel: CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n kernel: CR2: 0000000000000028 CR3: 00000001b1ee0000 CR4: 00000000001506f0\n kernel: Call Trace:\n kernel:  \u003cTASK\u003e\n kernel:  ? __die_body+0x1a/0x60\n kernel:  ? page_fault_oops+0x16f/0x4a0\n kernel:  ? search_bpf_extables+0x65/0x70\n kernel:  ? fixup_exception+0x22/0x310\n kernel:  ? exc_page_fault+0x69/0x150\n kernel:  ? asm_exc_page_fault+0x22/0x30\n kernel:  ? __pfx_hugetlbfs_fill_super+0x10/0x10\n kernel:  ? hugetlbfs_fill_super+0xb4/0x1a0\n kernel:  ? hugetlbfs_fill_super+0x28/0x1a0\n kernel:  ? __pfx_hugetlbfs_fill_super+0x10/0x10\n kernel:  vfs_get_super+0x40/0xa0\n kernel:  ? __pfx_bpf_lsm_capable+0x10/0x10\n kernel:  vfs_get_tree+0x25/0xd0\n kernel:  vfs_cmd_create+0x64/0xe0\n kernel:  __x64_sys_fsconfig+0x395/0x410\n kernel:  do_syscall_64+0x80/0x160\n kernel:  ? syscall_exit_to_user_mode+0x82/0x240\n kernel:  ? do_syscall_64+0x8d/0x160\n kernel:  ? syscall_exit_to_user_mode+0x82/0x240\n kernel:  ? do_syscall_64+0x8d/0x160\n kernel:  ? exc_page_fault+0x69/0x150\n kernel:  entry_SYSCALL_64_after_hwframe+0x6e/0x76\n kernel: RIP: 0033:0x7ffbc0cb87c9\n kernel: Code: 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 \u003c48\u003e 3d 01 f0 ff ff 73 01 c3 48 8b 0d 97 96 0d 00 f7 d8 64 89 01 48\n kernel: RSP: 002b:00007ffc29d2f388 EFLAGS: 00000206 ORIG_RAX: 00000000000001af\n kernel: RAX: fffffffffff\n---truncated---",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26688",
          "url": "https://www.suse.com/security/cve/CVE-2024-26688"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222482 for CVE-2024-26688",
          "url": "https://bugzilla.suse.com/1222482"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26688"
    },
    {
      "cve": "CVE-2024-26689",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26689"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nceph: prevent use-after-free in encode_cap_msg()\n\nIn fs/ceph/caps.c, in encode_cap_msg(), \"use after free\" error was\ncaught by KASAN at this line - \u0027ceph_buffer_get(arg-\u003exattr_buf);\u0027. This\nimplies before the refcount could be increment here, it was freed.\n\nIn same file, in \"handle_cap_grant()\" refcount is decremented by this\nline - \u0027ceph_buffer_put(ci-\u003ei_xattrs.blob);\u0027. It appears that a race\noccurred and resource was freed by the latter line before the former\nline could increment it.\n\nencode_cap_msg() is called by __send_cap() and __send_cap() is called by\nceph_check_caps() after calling __prep_cap(). __prep_cap() is where\narg-\u003exattr_buf is assigned to ci-\u003ei_xattrs.blob. This is the spot where\nthe refcount must be increased to prevent \"use after free\" error.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26689",
          "url": "https://www.suse.com/security/cve/CVE-2024-26689"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222503 for CVE-2024-26689",
          "url": "https://bugzilla.suse.com/1222503"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26689"
    },
    {
      "cve": "CVE-2024-26696",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26696"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnilfs2: fix hang in nilfs_lookup_dirty_data_buffers()\n\nSyzbot reported a hang issue in migrate_pages_batch() called by mbind()\nand nilfs_lookup_dirty_data_buffers() called in the log writer of nilfs2.\n\nWhile migrate_pages_batch() locks a folio and waits for the writeback to\ncomplete, the log writer thread that should bring the writeback to\ncompletion picks up the folio being written back in\nnilfs_lookup_dirty_data_buffers() that it calls for subsequent log\ncreation and was trying to lock the folio.  Thus causing a deadlock.\n\nIn the first place, it is unexpected that folios/pages in the middle of\nwriteback will be updated and become dirty.  Nilfs2 adds a checksum to\nverify the validity of the log being written and uses it for recovery at\nmount, so data changes during writeback are suppressed.  Since this is\nbroken, an unclean shutdown could potentially cause recovery to fail.\n\nInvestigation revealed that the root cause is that the wait for writeback\ncompletion in nilfs_page_mkwrite() is conditional, and if the backing\ndevice does not require stable writes, data may be modified without\nwaiting.\n\nFix these issues by making nilfs_page_mkwrite() wait for writeback to\nfinish regardless of the stable write requirement of the backing device.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26696",
          "url": "https://www.suse.com/security/cve/CVE-2024-26696"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222549 for CVE-2024-26696",
          "url": "https://bugzilla.suse.com/1222549"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26696"
    },
    {
      "cve": "CVE-2024-26697",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26697"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnilfs2: fix data corruption in dsync block recovery for small block sizes\n\nThe helper function nilfs_recovery_copy_block() of\nnilfs_recovery_dsync_blocks(), which recovers data from logs created by\ndata sync writes during a mount after an unclean shutdown, incorrectly\ncalculates the on-page offset when copying repair data to the file\u0027s page\ncache.  In environments where the block size is smaller than the page\nsize, this flaw can cause data corruption and leak uninitialized memory\nbytes during the recovery process.\n\nFix these issues by correcting this byte offset calculation on the page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26697",
          "url": "https://www.suse.com/security/cve/CVE-2024-26697"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222550 for CVE-2024-26697",
          "url": "https://bugzilla.suse.com/1222550"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26697"
    },
    {
      "cve": "CVE-2024-26702",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26702"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\niio: magnetometer: rm3100: add boundary check for the value read from RM3100_REG_TMRC\n\nRecently, we encounter kernel crash in function rm3100_common_probe\ncaused by out of bound access of array rm3100_samp_rates (because of\nunderlying hardware failures). Add boundary check to prevent out of\nbound access.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26702",
          "url": "https://www.suse.com/security/cve/CVE-2024-26702"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222424 for CVE-2024-26702",
          "url": "https://bugzilla.suse.com/1222424"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26702"
    },
    {
      "cve": "CVE-2024-26704",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26704"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\next4: fix double-free of blocks due to wrong extents moved_len\n\nIn ext4_move_extents(), moved_len is only updated when all moves are\nsuccessfully executed, and only discards orig_inode and donor_inode\npreallocations when moved_len is not zero. When the loop fails to exit\nafter successfully moving some extents, moved_len is not updated and\nremains at 0, so it does not discard the preallocations.\n\nIf the moved extents overlap with the preallocated extents, the\noverlapped extents are freed twice in ext4_mb_release_inode_pa() and\next4_process_freed_data() (as described in commit 94d7c16cbbbd (\"ext4:\nFix double-free of blocks with EXT4_IOC_MOVE_EXT\")), and bb_free is\nincremented twice. Hence when trim is executed, a zero-division bug is\ntriggered in mb_update_avg_fragment_size() because bb_free is not zero\nand bb_fragments is zero.\n\nTherefore, update move_len after each extent move to avoid the issue.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26704",
          "url": "https://www.suse.com/security/cve/CVE-2024-26704"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222422 for CVE-2024-26704",
          "url": "https://bugzilla.suse.com/1222422"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26704"
    },
    {
      "cve": "CVE-2024-26718",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26718"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndm-crypt, dm-verity: disable tasklets\n\nTasklets have an inherent problem with memory corruption. The function\ntasklet_action_common calls tasklet_trylock, then it calls the tasklet\ncallback and then it calls tasklet_unlock. If the tasklet callback frees\nthe structure that contains the tasklet or if it calls some code that may\nfree it, tasklet_unlock will write into free memory.\n\nThe commits 8e14f610159d and d9a02e016aaf try to fix it for dm-crypt, but\nit is not a sufficient fix and the data corruption can still happen [1].\nThere is no fix for dm-verity and dm-verity will write into free memory\nwith every tasklet-processed bio.\n\nThere will be atomic workqueues implemented in the kernel 6.9 [2]. They\nwill have better interface and they will not suffer from the memory\ncorruption problem.\n\nBut we need something that stops the memory corruption now and that can be\nbackported to the stable kernels. So, I\u0027m proposing this commit that\ndisables tasklets in both dm-crypt and dm-verity. This commit doesn\u0027t\nremove the tasklet support, because the tasklet code will be reused when\natomic workqueues will be implemented.\n\n[1] https://lore.kernel.org/all/d390d7ee-f142-44d3-822a-87949e14608b@suse.de/T/\n[2] https://lore.kernel.org/lkml/20240130091300.2968534-1-tj@kernel.org/",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26718",
          "url": "https://www.suse.com/security/cve/CVE-2024-26718"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222416 for CVE-2024-26718",
          "url": "https://bugzilla.suse.com/1222416"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26718"
    },
    {
      "cve": "CVE-2024-26722",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26722"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nASoC: rt5645: Fix deadlock in rt5645_jack_detect_work()\n\nThere is a path in rt5645_jack_detect_work(), where rt5645-\u003ejd_mutex\nis left locked forever. That may lead to deadlock\nwhen rt5645_jack_detect_work() is called for the second time.\n\nFound by Linux Verification Center (linuxtesting.org) with SVACE.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26722",
          "url": "https://www.suse.com/security/cve/CVE-2024-26722"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222520 for CVE-2024-26722",
          "url": "https://bugzilla.suse.com/1222520"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26722"
    },
    {
      "cve": "CVE-2024-26727",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26727"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: do not ASSERT() if the newly created subvolume already got read\n\n[BUG]\nThere is a syzbot crash, triggered by the ASSERT() during subvolume\ncreation:\n\n assertion failed: !anon_dev, in fs/btrfs/disk-io.c:1319\n ------------[ cut here ]------------\n kernel BUG at fs/btrfs/disk-io.c:1319!\n invalid opcode: 0000 [#1] PREEMPT SMP KASAN\n RIP: 0010:btrfs_get_root_ref.part.0+0x9aa/0xa60\n  \u003cTASK\u003e\n  btrfs_get_new_fs_root+0xd3/0xf0\n  create_subvol+0xd02/0x1650\n  btrfs_mksubvol+0xe95/0x12b0\n  __btrfs_ioctl_snap_create+0x2f9/0x4f0\n  btrfs_ioctl_snap_create+0x16b/0x200\n  btrfs_ioctl+0x35f0/0x5cf0\n  __x64_sys_ioctl+0x19d/0x210\n  do_syscall_64+0x3f/0xe0\n  entry_SYSCALL_64_after_hwframe+0x63/0x6b\n ---[ end trace 0000000000000000 ]---\n\n[CAUSE]\nDuring create_subvol(), after inserting root item for the newly created\nsubvolume, we would trigger btrfs_get_new_fs_root() to get the\nbtrfs_root of that subvolume.\n\nThe idea here is, we have preallocated an anonymous device number for\nthe subvolume, thus we can assign it to the new subvolume.\n\nBut there is really nothing preventing things like backref walk to read\nthe new subvolume.\nIf that happens before we call btrfs_get_new_fs_root(), the subvolume\nwould be read out, with a new anonymous device number assigned already.\n\nIn that case, we would trigger ASSERT(), as we really expect no one to\nread out that subvolume (which is not yet accessible from the fs).\nBut things like backref walk is still possible to trigger the read on\nthe subvolume.\n\nThus our assumption on the ASSERT() is not correct in the first place.\n\n[FIX]\nFix it by removing the ASSERT(), and just free the @anon_dev, reset it\nto 0, and continue.\n\nIf the subvolume tree is read out by something else, it should have\nalready get a new anon_dev assigned thus we only need to free the\npreallocated one.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26727",
          "url": "https://www.suse.com/security/cve/CVE-2024-26727"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222536 for CVE-2024-26727",
          "url": "https://bugzilla.suse.com/1222536"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26727"
    },
    {
      "cve": "CVE-2024-26733",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26733"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\narp: Prevent overflow in arp_req_get().\n\nsyzkaller reported an overflown write in arp_req_get(). [0]\n\nWhen ioctl(SIOCGARP) is issued, arp_req_get() looks up an neighbour\nentry and copies neigh-\u003eha to struct arpreq.arp_ha.sa_data.\n\nThe arp_ha here is struct sockaddr, not struct sockaddr_storage, so\nthe sa_data buffer is just 14 bytes.\n\nIn the splat below, 2 bytes are overflown to the next int field,\narp_flags.  We initialise the field just after the memcpy(), so it\u0027s\nnot a problem.\n\nHowever, when dev-\u003eaddr_len is greater than 22 (e.g. MAX_ADDR_LEN),\narp_netmask is overwritten, which could be set as htonl(0xFFFFFFFFUL)\nin arp_ioctl() before calling arp_req_get().\n\nTo avoid the overflow, let\u0027s limit the max length of memcpy().\n\nNote that commit b5f0de6df6dc (\"net: dev: Convert sa_data to flexible\narray in struct sockaddr\") just silenced syzkaller.\n\n[0]:\nmemcpy: detected field-spanning write (size 16) of single field \"r-\u003earp_ha.sa_data\" at net/ipv4/arp.c:1128 (size 14)\nWARNING: CPU: 0 PID: 144638 at net/ipv4/arp.c:1128 arp_req_get+0x411/0x4a0 net/ipv4/arp.c:1128\nModules linked in:\nCPU: 0 PID: 144638 Comm: syz-executor.4 Not tainted 6.1.74 #31\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.0-debian-1.16.0-5 04/01/2014\nRIP: 0010:arp_req_get+0x411/0x4a0 net/ipv4/arp.c:1128\nCode: fd ff ff e8 41 42 de fb b9 0e 00 00 00 4c 89 fe 48 c7 c2 20 6d ab 87 48 c7 c7 80 6d ab 87 c6 05 25 af 72 04 01 e8 5f 8d ad fb \u003c0f\u003e 0b e9 6c fd ff ff e8 13 42 de fb be 03 00 00 00 4c 89 e7 e8 a6\nRSP: 0018:ffffc900050b7998 EFLAGS: 00010286\nRAX: 0000000000000000 RBX: ffff88803a815000 RCX: 0000000000000000\nRDX: 0000000000000000 RSI: ffffffff8641a44a RDI: 0000000000000001\nRBP: ffffc900050b7a98 R08: 0000000000000001 R09: 0000000000000000\nR10: 0000000000000000 R11: 203a7970636d656d R12: ffff888039c54000\nR13: 1ffff92000a16f37 R14: ffff88803a815084 R15: 0000000000000010\nFS:  00007f172bf306c0(0000) GS:ffff88805aa00000(0000) knlGS:0000000000000000\nCS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 00007f172b3569f0 CR3: 0000000057f12005 CR4: 0000000000770ef0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\nPKRU: 55555554\nCall Trace:\n \u003cTASK\u003e\n arp_ioctl+0x33f/0x4b0 net/ipv4/arp.c:1261\n inet_ioctl+0x314/0x3a0 net/ipv4/af_inet.c:981\n sock_do_ioctl+0xdf/0x260 net/socket.c:1204\n sock_ioctl+0x3ef/0x650 net/socket.c:1321\n vfs_ioctl fs/ioctl.c:51 [inline]\n __do_sys_ioctl fs/ioctl.c:870 [inline]\n __se_sys_ioctl fs/ioctl.c:856 [inline]\n __x64_sys_ioctl+0x18e/0x220 fs/ioctl.c:856\n do_syscall_x64 arch/x86/entry/common.c:51 [inline]\n do_syscall_64+0x37/0x90 arch/x86/entry/common.c:81\n entry_SYSCALL_64_after_hwframe+0x64/0xce\nRIP: 0033:0x7f172b262b8d\nCode: 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 \u003c48\u003e 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48\nRSP: 002b:00007f172bf300b8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010\nRAX: ffffffffffffffda RBX: 00007f172b3abf80 RCX: 00007f172b262b8d\nRDX: 0000000020000000 RSI: 0000000000008954 RDI: 0000000000000003\nRBP: 00007f172b2d3493 R08: 0000000000000000 R09: 0000000000000000\nR10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000\nR13: 000000000000000b R14: 00007f172b3abf80 R15: 00007f172bf10000\n \u003c/TASK\u003e",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26733",
          "url": "https://www.suse.com/security/cve/CVE-2024-26733"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222585 for CVE-2024-26733",
          "url": "https://bugzilla.suse.com/1222585"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26733"
    },
    {
      "cve": "CVE-2024-26736",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26736"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nafs: Increase buffer size in afs_update_volume_status()\n\nThe max length of volume-\u003evid value is 20 characters.\nSo increase idbuf[] size up to 24 to avoid overflow.\n\nFound by Linux Verification Center (linuxtesting.org) with SVACE.\n\n[DH: Actually, it\u0027s 20 + NUL, so increase it to 24 and use snprintf()]",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26736",
          "url": "https://www.suse.com/security/cve/CVE-2024-26736"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222586 for CVE-2024-26736",
          "url": "https://bugzilla.suse.com/1222586"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26736"
    },
    {
      "cve": "CVE-2024-26737",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26737"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Fix racing between bpf_timer_cancel_and_free and bpf_timer_cancel\n\nThe following race is possible between bpf_timer_cancel_and_free\nand bpf_timer_cancel. It will lead a UAF on the timer-\u003etimer.\n\nbpf_timer_cancel();\n\tspin_lock();\n\tt = timer-\u003etime;\n\tspin_unlock();\n\n\t\t\t\t\tbpf_timer_cancel_and_free();\n\t\t\t\t\t\tspin_lock();\n\t\t\t\t\t\tt = timer-\u003etimer;\n\t\t\t\t\t\ttimer-\u003etimer = NULL;\n\t\t\t\t\t\tspin_unlock();\n\t\t\t\t\t\thrtimer_cancel(\u0026t-\u003etimer);\n\t\t\t\t\t\tkfree(t);\n\n\t/* UAF on t */\n\thrtimer_cancel(\u0026t-\u003etimer);\n\nIn bpf_timer_cancel_and_free, this patch frees the timer-\u003etimer\nafter a rcu grace period. This requires a rcu_head addition\nto the \"struct bpf_hrtimer\". Another kfree(t) happens in bpf_timer_init,\nthis does not need a kfree_rcu because it is still under the\nspin_lock and timer-\u003etimer has not been visible by others yet.\n\nIn bpf_timer_cancel, rcu_read_lock() is added because this helper\ncan be used in a non rcu critical section context (e.g. from\na sleepable bpf prog). Other timer-\u003etimer usages in helpers.c\nhave been audited, bpf_timer_cancel() is the only place where\ntimer-\u003etimer is used outside of the spin_lock.\n\nAnother solution considered is to mark a t-\u003eflag in bpf_timer_cancel\nand clear it after hrtimer_cancel() is done.  In bpf_timer_cancel_and_free,\nit busy waits for the flag to be cleared before kfree(t). This patch\ngoes with a straight forward solution and frees timer-\u003etimer after\na rcu grace period.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26737",
          "url": "https://www.suse.com/security/cve/CVE-2024-26737"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222557 for CVE-2024-26737",
          "url": "https://bugzilla.suse.com/1222557"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26737"
    },
    {
      "cve": "CVE-2024-26739",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26739"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/sched: act_mirred: don\u0027t override retval if we already lost the skb\n\nIf we\u0027re redirecting the skb, and haven\u0027t called tcf_mirred_forward(),\nyet, we need to tell the core to drop the skb by setting the retcode\nto SHOT. If we have called tcf_mirred_forward(), however, the skb\nis out of our hands and returning SHOT will lead to UaF.\n\nMove the retval override to the error path which actually need it.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26739",
          "url": "https://www.suse.com/security/cve/CVE-2024-26739"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222559 for CVE-2024-26739",
          "url": "https://bugzilla.suse.com/1222559"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26739"
    },
    {
      "cve": "CVE-2024-26743",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26743"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/qedr: Fix qedr_create_user_qp error flow\n\nAvoid the following warning by making sure to free the allocated\nresources in case that qedr_init_user_queue() fail.\n\n-----------[ cut here ]-----------\nWARNING: CPU: 0 PID: 143192 at drivers/infiniband/core/rdma_core.c:874 uverbs_destroy_ufile_hw+0xcf/0xf0 [ib_uverbs]\nModules linked in: tls target_core_user uio target_core_pscsi target_core_file target_core_iblock ib_srpt ib_srp scsi_transport_srp nfsd nfs_acl rpcsec_gss_krb5 auth_rpcgss nfsv4 dns_resolver nfs lockd grace fscache netfs 8021q garp mrp stp llc ext4 mbcache jbd2 opa_vnic ib_umad ib_ipoib sunrpc rdma_ucm ib_isert iscsi_target_mod target_core_mod ib_iser libiscsi scsi_transport_iscsi rdma_cm iw_cm ib_cm hfi1 intel_rapl_msr intel_rapl_common mgag200 qedr sb_edac drm_shmem_helper rdmavt x86_pkg_temp_thermal drm_kms_helper intel_powerclamp ib_uverbs coretemp i2c_algo_bit kvm_intel dell_wmi_descriptor ipmi_ssif sparse_keymap kvm ib_core rfkill syscopyarea sysfillrect video sysimgblt irqbypass ipmi_si ipmi_devintf fb_sys_fops rapl iTCO_wdt mxm_wmi iTCO_vendor_support intel_cstate pcspkr dcdbas intel_uncore ipmi_msghandler lpc_ich acpi_power_meter mei_me mei fuse drm xfs libcrc32c qede sd_mod ahci libahci t10_pi sg crct10dif_pclmul crc32_pclmul crc32c_intel qed libata tg3\nghash_clmulni_intel megaraid_sas crc8 wmi [last unloaded: ib_srpt]\nCPU: 0 PID: 143192 Comm: fi_rdm_tagged_p Kdump: loaded Not tainted 5.14.0-408.el9.x86_64 #1\nHardware name: Dell Inc. PowerEdge R430/03XKDV, BIOS 2.14.0 01/25/2022\nRIP: 0010:uverbs_destroy_ufile_hw+0xcf/0xf0 [ib_uverbs]\nCode: 5d 41 5c 41 5d 41 5e e9 0f 26 1b dd 48 89 df e8 67 6a ff ff 49 8b 86 10 01 00 00 48 85 c0 74 9c 4c 89 e7 e8 83 c0 cb dd eb 92 \u003c0f\u003e 0b eb be 0f 0b be 04 00 00 00 48 89 df e8 8e f5 ff ff e9 6d ff\nRSP: 0018:ffffb7c6cadfbc60 EFLAGS: 00010286\nRAX: ffff8f0889ee3f60 RBX: ffff8f088c1a5200 RCX: 00000000802a0016\nRDX: 00000000802a0017 RSI: 0000000000000001 RDI: ffff8f0880042600\nRBP: 0000000000000001 R08: 0000000000000001 R09: 0000000000000000\nR10: ffff8f11fffd5000 R11: 0000000000039000 R12: ffff8f0d5b36cd80\nR13: ffff8f088c1a5250 R14: ffff8f1206d91000 R15: 0000000000000000\nFS: 0000000000000000(0000) GS:ffff8f11d7c00000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 0000147069200e20 CR3: 00000001c7210002 CR4: 00000000001706f0\nCall Trace:\n\u003cTASK\u003e\n? show_trace_log_lvl+0x1c4/0x2df\n? show_trace_log_lvl+0x1c4/0x2df\n? ib_uverbs_close+0x1f/0xb0 [ib_uverbs]\n? uverbs_destroy_ufile_hw+0xcf/0xf0 [ib_uverbs]\n? __warn+0x81/0x110\n? uverbs_destroy_ufile_hw+0xcf/0xf0 [ib_uverbs]\n? report_bug+0x10a/0x140\n? handle_bug+0x3c/0x70\n? exc_invalid_op+0x14/0x70\n? asm_exc_invalid_op+0x16/0x20\n? uverbs_destroy_ufile_hw+0xcf/0xf0 [ib_uverbs]\nib_uverbs_close+0x1f/0xb0 [ib_uverbs]\n__fput+0x94/0x250\ntask_work_run+0x5c/0x90\ndo_exit+0x270/0x4a0\ndo_group_exit+0x2d/0x90\nget_signal+0x87c/0x8c0\narch_do_signal_or_restart+0x25/0x100\n? ib_uverbs_ioctl+0xc2/0x110 [ib_uverbs]\nexit_to_user_mode_loop+0x9c/0x130\nexit_to_user_mode_prepare+0xb6/0x100\nsyscall_exit_to_user_mode+0x12/0x40\ndo_syscall_64+0x69/0x90\n? syscall_exit_work+0x103/0x130\n? syscall_exit_to_user_mode+0x22/0x40\n? do_syscall_64+0x69/0x90\n? syscall_exit_work+0x103/0x130\n? syscall_exit_to_user_mode+0x22/0x40\n? do_syscall_64+0x69/0x90\n? do_syscall_64+0x69/0x90\n? common_interrupt+0x43/0xa0\nentry_SYSCALL_64_after_hwframe+0x72/0xdc\nRIP: 0033:0x1470abe3ec6b\nCode: Unable to access opcode bytes at RIP 0x1470abe3ec41.\nRSP: 002b:00007fff13ce9108 EFLAGS: 00000246 ORIG_RAX: 0000000000000010\nRAX: fffffffffffffffc RBX: 00007fff13ce9218 RCX: 00001470abe3ec6b\nRDX: 00007fff13ce9200 RSI: 00000000c0181b01 RDI: 0000000000000004\nRBP: 00007fff13ce91e0 R08: 0000558d9655da10 R09: 0000558d9655dd00\nR10: 00007fff13ce95c0 R11: 0000000000000246 R12: 00007fff13ce9358\nR13: 0000000000000013 R14: 0000558d9655db50 R15: 00007fff13ce9470\n\u003c/TASK\u003e\n--[ end trace 888a9b92e04c5c97 ]--",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26743",
          "url": "https://www.suse.com/security/cve/CVE-2024-26743"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222677 for CVE-2024-26743",
          "url": "https://bugzilla.suse.com/1222677"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "low"
        }
      ],
      "title": "CVE-2024-26743"
    },
    {
      "cve": "CVE-2024-26744",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26744"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/srpt: Support specifying the srpt_service_guid parameter\n\nMake loading ib_srpt with this parameter set work. The current behavior is\nthat setting that parameter while loading the ib_srpt kernel module\ntriggers the following kernel crash:\n\nBUG: kernel NULL pointer dereference, address: 0000000000000000\nCall Trace:\n \u003cTASK\u003e\n parse_one+0x18c/0x1d0\n parse_args+0xe1/0x230\n load_module+0x8de/0xa60\n init_module_from_file+0x8b/0xd0\n idempotent_init_module+0x181/0x240\n __x64_sys_finit_module+0x5a/0xb0\n do_syscall_64+0x5f/0xe0\n entry_SYSCALL_64_after_hwframe+0x6e/0x76",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26744",
          "url": "https://www.suse.com/security/cve/CVE-2024-26744"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222449 for CVE-2024-26744",
          "url": "https://bugzilla.suse.com/1222449"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26744"
    },
    {
      "cve": "CVE-2024-26745",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26745"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\npowerpc/pseries/iommu: IOMMU table is not initialized for kdump over SR-IOV\n\nWhen kdump kernel tries to copy dump data over SR-IOV, LPAR panics due\nto NULL pointer exception:\n\n  Kernel attempted to read user page (0) - exploit attempt? (uid: 0)\n  BUG: Kernel NULL pointer dereference on read at 0x00000000\n  Faulting instruction address: 0xc000000020847ad4\n  Oops: Kernel access of bad area, sig: 11 [#1]\n  LE PAGE_SIZE=64K MMU=Radix SMP NR_CPUS=2048 NUMA pSeries\n  Modules linked in: mlx5_core(+) vmx_crypto pseries_wdt papr_scm libnvdimm mlxfw tls psample sunrpc fuse overlay squashfs loop\n  CPU: 12 PID: 315 Comm: systemd-udevd Not tainted 6.4.0-Test102+ #12\n  Hardware name: IBM,9080-HEX POWER10 (raw) 0x800200 0xf000006 of:IBM,FW1060.00 (NH1060_008) hv:phyp pSeries\n  NIP:  c000000020847ad4 LR: c00000002083b2dc CTR: 00000000006cd18c\n  REGS: c000000029162ca0 TRAP: 0300   Not tainted  (6.4.0-Test102+)\n  MSR:  800000000280b033 \u003cSF,VEC,VSX,EE,FP,ME,IR,DR,RI,LE\u003e  CR: 48288244  XER: 00000008\n  CFAR: c00000002083b2d8 DAR: 0000000000000000 DSISR: 40000000 IRQMASK: 1\n  ...\n  NIP _find_next_zero_bit+0x24/0x110\n  LR  bitmap_find_next_zero_area_off+0x5c/0xe0\n  Call Trace:\n    dev_printk_emit+0x38/0x48 (unreliable)\n    iommu_area_alloc+0xc4/0x180\n    iommu_range_alloc+0x1e8/0x580\n    iommu_alloc+0x60/0x130\n    iommu_alloc_coherent+0x158/0x2b0\n    dma_iommu_alloc_coherent+0x3c/0x50\n    dma_alloc_attrs+0x170/0x1f0\n    mlx5_cmd_init+0xc0/0x760 [mlx5_core]\n    mlx5_function_setup+0xf0/0x510 [mlx5_core]\n    mlx5_init_one+0x84/0x210 [mlx5_core]\n    probe_one+0x118/0x2c0 [mlx5_core]\n    local_pci_probe+0x68/0x110\n    pci_call_probe+0x68/0x200\n    pci_device_probe+0xbc/0x1a0\n    really_probe+0x104/0x540\n    __driver_probe_device+0xb4/0x230\n    driver_probe_device+0x54/0x130\n    __driver_attach+0x158/0x2b0\n    bus_for_each_dev+0xa8/0x130\n    driver_attach+0x34/0x50\n    bus_add_driver+0x16c/0x300\n    driver_register+0xa4/0x1b0\n    __pci_register_driver+0x68/0x80\n    mlx5_init+0xb8/0x100 [mlx5_core]\n    do_one_initcall+0x60/0x300\n    do_init_module+0x7c/0x2b0\n\nAt the time of LPAR dump, before kexec hands over control to kdump\nkernel, DDWs (Dynamic DMA Windows) are scanned and added to the FDT.\nFor the SR-IOV case, default DMA window \"ibm,dma-window\" is removed from\nthe FDT and DDW added, for the device.\n\nNow, kexec hands over control to the kdump kernel.\n\nWhen the kdump kernel initializes, PCI busses are scanned and IOMMU\ngroup/tables created, in pci_dma_bus_setup_pSeriesLP(). For the SR-IOV\ncase, there is no \"ibm,dma-window\". The original commit: b1fc44eaa9ba,\nfixes the path where memory is pre-mapped (direct mapped) to the DDW.\nWhen TCEs are direct mapped, there is no need to initialize IOMMU\ntables.\n\niommu_table_setparms_lpar() only considers \"ibm,dma-window\" property\nwhen initiallizing IOMMU table. In the scenario where TCEs are\ndynamically allocated for SR-IOV, newly created IOMMU table is not\ninitialized. Later, when the device driver tries to enter TCEs for the\nSR-IOV device, NULL pointer execption is thrown from iommu_area_alloc().\n\nThe fix is to initialize the IOMMU table with DDW property stored in the\nFDT. There are 2 points to remember:\n\n\t1. For the dedicated adapter, kdump kernel would encounter both\n\t   default and DDW in FDT. In this case, DDW property is used to\n\t   initialize the IOMMU table.\n\n\t2. A DDW could be direct or dynamic mapped. kdump kernel would\n\t   initialize IOMMU table and mark the existing DDW as\n\t   \"dynamic\". This works fine since, at the time of table\n\t   initialization, iommu_table_clear() makes some space in the\n\t   DDW, for some predefined number of TCEs which are needed for\n\t   kdump to succeed.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26745",
          "url": "https://www.suse.com/security/cve/CVE-2024-26745"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222678 for CVE-2024-26745",
          "url": "https://bugzilla.suse.com/1222678"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26745"
    },
    {
      "cve": "CVE-2024-26747",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26747"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: roles: fix NULL pointer issue when put module\u0027s reference\n\nIn current design, usb role class driver will get usb_role_switch parent\u0027s\nmodule reference after the user get usb_role_switch device and put the\nreference after the user put the usb_role_switch device. However, the\nparent device of usb_role_switch may be removed before the user put the\nusb_role_switch. If so, then, NULL pointer issue will be met when the user\nput the parent module\u0027s reference.\n\nThis will save the module pointer in structure of usb_role_switch. Then,\nwe don\u0027t need to find module by iterating long relations.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26747",
          "url": "https://www.suse.com/security/cve/CVE-2024-26747"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222609 for CVE-2024-26747",
          "url": "https://bugzilla.suse.com/1222609"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26747"
    },
    {
      "cve": "CVE-2024-26749",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26749"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: cdns3: fixed memory use after free at cdns3_gadget_ep_disable()\n\n  ...\n  cdns3_gadget_ep_free_request(\u0026priv_ep-\u003eendpoint, \u0026priv_req-\u003erequest);\n  list_del_init(\u0026priv_req-\u003elist);\n  ...\n\n\u0027priv_req\u0027 actually free at cdns3_gadget_ep_free_request(). But\nlist_del_init() use priv_req-\u003elist after it.\n\n[ 1542.642868][  T534] BUG: KFENCE: use-after-free read in __list_del_entry_valid+0x10/0xd4\n[ 1542.642868][  T534]\n[ 1542.653162][  T534] Use-after-free read at 0x000000009ed0ba99 (in kfence-#3):\n[ 1542.660311][  T534]  __list_del_entry_valid+0x10/0xd4\n[ 1542.665375][  T534]  cdns3_gadget_ep_disable+0x1f8/0x388 [cdns3]\n[ 1542.671571][  T534]  usb_ep_disable+0x44/0xe4\n[ 1542.675948][  T534]  ffs_func_eps_disable+0x64/0xc8\n[ 1542.680839][  T534]  ffs_func_set_alt+0x74/0x368\n[ 1542.685478][  T534]  ffs_func_disable+0x18/0x28\n\nMove list_del_init() before cdns3_gadget_ep_free_request() to resolve this\nproblem.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26749",
          "url": "https://www.suse.com/security/cve/CVE-2024-26749"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222680 for CVE-2024-26749",
          "url": "https://bugzilla.suse.com/1222680"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26749"
    },
    {
      "cve": "CVE-2024-26751",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26751"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nARM: ep93xx: Add terminator to gpiod_lookup_table\n\nWithout the terminator, if a con_id is passed to gpio_find() that\ndoes not exist in the lookup table the function will not stop looping\ncorrectly, and eventually cause an oops.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26751",
          "url": "https://www.suse.com/security/cve/CVE-2024-26751"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222724 for CVE-2024-26751",
          "url": "https://bugzilla.suse.com/1222724"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "low"
        }
      ],
      "title": "CVE-2024-26751"
    },
    {
      "cve": "CVE-2024-26754",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26754"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ngtp: fix use-after-free and null-ptr-deref in gtp_genl_dump_pdp()\n\nThe gtp_net_ops pernet operations structure for the subsystem must be\nregistered before registering the generic netlink family.\n\nSyzkaller hit \u0027general protection fault in gtp_genl_dump_pdp\u0027 bug:\n\ngeneral protection fault, probably for non-canonical address\n0xdffffc0000000002: 0000 [#1] PREEMPT SMP KASAN NOPTI\nKASAN: null-ptr-deref in range [0x0000000000000010-0x0000000000000017]\nCPU: 1 PID: 5826 Comm: gtp Not tainted 6.8.0-rc3-std-def-alt1 #1\nHardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.0-alt1 04/01/2014\nRIP: 0010:gtp_genl_dump_pdp+0x1be/0x800 [gtp]\nCode: c6 89 c6 e8 64 e9 86 df 58 45 85 f6 0f 85 4e 04 00 00 e8 c5 ee 86\n      df 48 8b 54 24 18 48 b8 00 00 00 00 00 fc ff df 48 c1 ea 03 \u003c80\u003e\n      3c 02 00 0f 85 de 05 00 00 48 8b 44 24 18 4c 8b 30 4c 39 f0 74\nRSP: 0018:ffff888014107220 EFLAGS: 00010202\nRAX: dffffc0000000000 RBX: 0000000000000000 RCX: 0000000000000000\nRDX: 0000000000000002 RSI: 0000000000000000 RDI: 0000000000000000\nRBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000\nR10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000\nR13: ffff88800fcda588 R14: 0000000000000001 R15: 0000000000000000\nFS:  00007f1be4eb05c0(0000) GS:ffff88806ce80000(0000) knlGS:0000000000000000\nCS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 00007f1be4e766cf CR3: 000000000c33e000 CR4: 0000000000750ef0\nPKRU: 55555554\nCall Trace:\n \u003cTASK\u003e\n ? show_regs+0x90/0xa0\n ? die_addr+0x50/0xd0\n ? exc_general_protection+0x148/0x220\n ? asm_exc_general_protection+0x22/0x30\n ? gtp_genl_dump_pdp+0x1be/0x800 [gtp]\n ? __alloc_skb+0x1dd/0x350\n ? __pfx___alloc_skb+0x10/0x10\n genl_dumpit+0x11d/0x230\n netlink_dump+0x5b9/0xce0\n ? lockdep_hardirqs_on_prepare+0x253/0x430\n ? __pfx_netlink_dump+0x10/0x10\n ? kasan_save_track+0x10/0x40\n ? __kasan_kmalloc+0x9b/0xa0\n ? genl_start+0x675/0x970\n __netlink_dump_start+0x6fc/0x9f0\n genl_family_rcv_msg_dumpit+0x1bb/0x2d0\n ? __pfx_genl_family_rcv_msg_dumpit+0x10/0x10\n ? genl_op_from_small+0x2a/0x440\n ? cap_capable+0x1d0/0x240\n ? __pfx_genl_start+0x10/0x10\n ? __pfx_genl_dumpit+0x10/0x10\n ? __pfx_genl_done+0x10/0x10\n ? security_capable+0x9d/0xe0",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26754",
          "url": "https://www.suse.com/security/cve/CVE-2024-26754"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222632 for CVE-2024-26754",
          "url": "https://bugzilla.suse.com/1222632"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26754"
    },
    {
      "cve": "CVE-2024-26760",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26760"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: target: pscsi: Fix bio_put() for error case\n\nAs of commit 066ff571011d (\"block: turn bio_kmalloc into a simple kmalloc\nwrapper\"), a bio allocated by bio_kmalloc() must be freed by bio_uninit()\nand kfree(). That is not done properly for the error case, hitting WARN and\nNULL pointer dereference in bio_free().",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26760",
          "url": "https://www.suse.com/security/cve/CVE-2024-26760"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222596 for CVE-2024-26760",
          "url": "https://bugzilla.suse.com/1222596"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26760"
    },
    {
      "cve": "CVE-2024-267600",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-267600"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "unknown",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-267600",
          "url": "https://www.suse.com/security/cve/CVE-2024-267600"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "not set"
        }
      ],
      "title": "CVE-2024-267600"
    },
    {
      "cve": "CVE-2024-26763",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26763"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndm-crypt: don\u0027t modify the data when using authenticated encryption\n\nIt was said that authenticated encryption could produce invalid tag when\nthe data that is being encrypted is modified [1]. So, fix this problem by\ncopying the data into the clone bio first and then encrypt them inside the\nclone bio.\n\nThis may reduce performance, but it is needed to prevent the user from\ncorrupting the device by writing data with O_DIRECT and modifying them at\nthe same time.\n\n[1] https://lore.kernel.org/all/20240207004723.GA35324@sol.localdomain/T/",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26763",
          "url": "https://www.suse.com/security/cve/CVE-2024-26763"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222720 for CVE-2024-26763",
          "url": "https://bugzilla.suse.com/1222720"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26763"
    },
    {
      "cve": "CVE-2024-26764",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26764"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfs/aio: Restrict kiocb_set_cancel_fn() to I/O submitted via libaio\n\nIf kiocb_set_cancel_fn() is called for I/O submitted via io_uring, the\nfollowing kernel warning appears:\n\nWARNING: CPU: 3 PID: 368 at fs/aio.c:598 kiocb_set_cancel_fn+0x9c/0xa8\nCall trace:\n kiocb_set_cancel_fn+0x9c/0xa8\n ffs_epfile_read_iter+0x144/0x1d0\n io_read+0x19c/0x498\n io_issue_sqe+0x118/0x27c\n io_submit_sqes+0x25c/0x5fc\n __arm64_sys_io_uring_enter+0x104/0xab0\n invoke_syscall+0x58/0x11c\n el0_svc_common+0xb4/0xf4\n do_el0_svc+0x2c/0xb0\n el0_svc+0x2c/0xa4\n el0t_64_sync_handler+0x68/0xb4\n el0t_64_sync+0x1a4/0x1a8\n\nFix this by setting the IOCB_AIO_RW flag for read and write I/O that is\nsubmitted by libaio.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26764",
          "url": "https://www.suse.com/security/cve/CVE-2024-26764"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222721 for CVE-2024-26764",
          "url": "https://bugzilla.suse.com/1222721"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "low"
        }
      ],
      "title": "CVE-2024-26764"
    },
    {
      "cve": "CVE-2024-26766",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26766"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nIB/hfi1: Fix sdma.h tx-\u003enum_descs off-by-one error\n\nUnfortunately the commit `fd8958efe877` introduced another error\ncausing the `descs` array to overflow. This reults in further crashes\neasily reproducible by `sendmsg` system call.\n\n[ 1080.836473] general protection fault, probably for non-canonical address 0x400300015528b00a: 0000 [#1] PREEMPT SMP PTI\n[ 1080.869326] RIP: 0010:hfi1_ipoib_build_ib_tx_headers.constprop.0+0xe1/0x2b0 [hfi1]\n--\n[ 1080.974535] Call Trace:\n[ 1080.976990]  \u003cTASK\u003e\n[ 1081.021929]  hfi1_ipoib_send_dma_common+0x7a/0x2e0 [hfi1]\n[ 1081.027364]  hfi1_ipoib_send_dma_list+0x62/0x270 [hfi1]\n[ 1081.032633]  hfi1_ipoib_send+0x112/0x300 [hfi1]\n[ 1081.042001]  ipoib_start_xmit+0x2a9/0x2d0 [ib_ipoib]\n[ 1081.046978]  dev_hard_start_xmit+0xc4/0x210\n--\n[ 1081.148347]  __sys_sendmsg+0x59/0xa0\n\ncrash\u003e ipoib_txreq 0xffff9cfeba229f00\nstruct ipoib_txreq {\n  txreq = {\n    list = {\n      next = 0xffff9cfeba229f00,\n      prev = 0xffff9cfeba229f00\n    },\n    descp = 0xffff9cfeba229f40,\n    coalesce_buf = 0x0,\n    wait = 0xffff9cfea4e69a48,\n    complete = 0xffffffffc0fe0760 \u003chfi1_ipoib_sdma_complete\u003e,\n    packet_len = 0x46d,\n    tlen = 0x0,\n    num_desc = 0x0,\n    desc_limit = 0x6,\n    next_descq_idx = 0x45c,\n    coalesce_idx = 0x0,\n    flags = 0x0,\n    descs = {{\n        qw = {0x8024000120dffb00, 0x4}  # SDMA_DESC0_FIRST_DESC_FLAG (bit 63)\n      }, {\n        qw = {  0x3800014231b108, 0x4}\n      }, {\n        qw = { 0x310000e4ee0fcf0, 0x8}\n      }, {\n        qw = {  0x3000012e9f8000, 0x8}\n      }, {\n        qw = {  0x59000dfb9d0000, 0x8}\n      }, {\n        qw = {  0x78000e02e40000, 0x8}\n      }}\n  },\n  sdma_hdr =  0x400300015528b000,  \u003c\u003c\u003c invalid pointer in the tx request structure\n  sdma_status = 0x0,                   SDMA_DESC0_LAST_DESC_FLAG (bit 62)\n  complete = 0x0,\n  priv = 0x0,\n  txq = 0xffff9cfea4e69880,\n  skb = 0xffff9d099809f400\n}\n\nIf an SDMA send consists of exactly 6 descriptors and requires dword\npadding (in the 7th descriptor), the sdma_txreq descriptor array is not\nproperly expanded and the packet will overflow into the container\nstructure. This results in a panic when the send completion runs. The\nexact panic varies depending on what elements of the container structure\nget corrupted. The fix is to use the correct expression in\n_pad_sdma_tx_descs() to test the need to expand the descriptor array.\n\nWith this patch the crashes are no longer reproducible and the machine is\nstable.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26766",
          "url": "https://www.suse.com/security/cve/CVE-2024-26766"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222726 for CVE-2024-26766",
          "url": "https://bugzilla.suse.com/1222726"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222882 for CVE-2024-26766",
          "url": "https://bugzilla.suse.com/1222882"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "important"
        }
      ],
      "title": "CVE-2024-26766"
    },
    {
      "cve": "CVE-2024-26769",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26769"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnvmet-fc: avoid deadlock on delete association path\n\nWhen deleting an association the shutdown path is deadlocking because we\ntry to flush the nvmet_wq nested. Avoid this by deadlock by deferring\nthe put work into its own work item.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26769",
          "url": "https://www.suse.com/security/cve/CVE-2024-26769"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222727 for CVE-2024-26769",
          "url": "https://bugzilla.suse.com/1222727"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26769"
    },
    {
      "cve": "CVE-2024-26771",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26771"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndmaengine: ti: edma: Add some null pointer checks to the edma_probe\n\ndevm_kasprintf() returns a pointer to dynamically allocated memory\nwhich can be NULL upon failure. Ensure the allocation was successful\nby checking the pointer validity.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26771",
          "url": "https://www.suse.com/security/cve/CVE-2024-26771"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222610 for CVE-2024-26771",
          "url": "https://bugzilla.suse.com/1222610"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26771"
    },
    {
      "cve": "CVE-2024-26772",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26772"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\next4: avoid allocating blocks from corrupted group in ext4_mb_find_by_goal()\n\nPlaces the logic for checking if the group\u0027s block bitmap is corrupt under\nthe protection of the group lock to avoid allocating blocks from the group\nwith a corrupted block bitmap.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26772",
          "url": "https://www.suse.com/security/cve/CVE-2024-26772"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222613 for CVE-2024-26772",
          "url": "https://bugzilla.suse.com/1222613"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26772"
    },
    {
      "cve": "CVE-2024-26773",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26773"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\next4: avoid allocating blocks from corrupted group in ext4_mb_try_best_found()\n\nDetermine if the group block bitmap is corrupted before using ac_b_ex in\next4_mb_try_best_found() to avoid allocating blocks from a group with a\ncorrupted block bitmap in the following concurrency and making the\nsituation worse.\n\next4_mb_regular_allocator\n  ext4_lock_group(sb, group)\n  ext4_mb_good_group\n   // check if the group bbitmap is corrupted\n  ext4_mb_complex_scan_group\n   // Scan group gets ac_b_ex but doesn\u0027t use it\n  ext4_unlock_group(sb, group)\n                           ext4_mark_group_bitmap_corrupted(group)\n                           // The block bitmap was corrupted during\n                           // the group unlock gap.\n  ext4_mb_try_best_found\n    ext4_lock_group(ac-\u003eac_sb, group)\n    ext4_mb_use_best_found\n      mb_mark_used\n      // Allocating blocks in block bitmap corrupted group",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26773",
          "url": "https://www.suse.com/security/cve/CVE-2024-26773"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222618 for CVE-2024-26773",
          "url": "https://bugzilla.suse.com/1222618"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26773"
    },
    {
      "cve": "CVE-2024-26776",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26776"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nspi: hisi-sfc-v3xx: Return IRQ_NONE if no interrupts were detected\n\nReturn IRQ_NONE from the interrupt handler when no interrupt was\ndetected. Because an empty interrupt will cause a null pointer error:\n\n    Unable to handle kernel NULL pointer dereference at virtual\n  address 0000000000000008\n    Call trace:\n        complete+0x54/0x100\n        hisi_sfc_v3xx_isr+0x2c/0x40 [spi_hisi_sfc_v3xx]\n        __handle_irq_event_percpu+0x64/0x1e0\n        handle_irq_event+0x7c/0x1cc",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26776",
          "url": "https://www.suse.com/security/cve/CVE-2024-26776"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222764 for CVE-2024-26776",
          "url": "https://bugzilla.suse.com/1222764"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26776"
    },
    {
      "cve": "CVE-2024-26779",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26779"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: mac80211: fix race condition on enabling fast-xmit\n\nfast-xmit must only be enabled after the sta has been uploaded to the driver,\notherwise it could end up passing the not-yet-uploaded sta via drv_tx calls\nto the driver, leading to potential crashes because of uninitialized drv_priv\ndata.\nAdd a missing sta-\u003euploaded check and re-check fast xmit after inserting a sta.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26779",
          "url": "https://www.suse.com/security/cve/CVE-2024-26779"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222772 for CVE-2024-26779",
          "url": "https://bugzilla.suse.com/1222772"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26779"
    },
    {
      "cve": "CVE-2024-26783",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26783"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm/vmscan: fix a bug calling wakeup_kswapd() with a wrong zone index\n\nWith numa balancing on, when a numa system is running where a numa node\ndoesn\u0027t have its local memory so it has no managed zones, the following\noops has been observed.  It\u0027s because wakeup_kswapd() is called with a\nwrong zone index, -1.  Fixed it by checking the index before calling\nwakeup_kswapd().\n\n\u003e BUG: unable to handle page fault for address: 00000000000033f3\n\u003e #PF: supervisor read access in kernel mode\n\u003e #PF: error_code(0x0000) - not-present page\n\u003e PGD 0 P4D 0\n\u003e Oops: 0000 [#1] PREEMPT SMP NOPTI\n\u003e CPU: 2 PID: 895 Comm: masim Not tainted 6.6.0-dirty #255\n\u003e Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS\n\u003e    rel-1.16.0-0-gd239552ce722-prebuilt.qemu.org 04/01/2014\n\u003e RIP: 0010:wakeup_kswapd (./linux/mm/vmscan.c:7812)\n\u003e Code: (omitted)\n\u003e RSP: 0000:ffffc90004257d58 EFLAGS: 00010286\n\u003e RAX: ffffffffffffffff RBX: ffff88883fff0480 RCX: 0000000000000003\n\u003e RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffff88883fff0480\n\u003e RBP: ffffffffffffffff R08: ff0003ffffffffff R09: ffffffffffffffff\n\u003e R10: ffff888106c95540 R11: 0000000055555554 R12: 0000000000000003\n\u003e R13: 0000000000000000 R14: 0000000000000000 R15: ffff88883fff0940\n\u003e FS:  00007fc4b8124740(0000) GS:ffff888827c00000(0000) knlGS:0000000000000000\n\u003e CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n\u003e CR2: 00000000000033f3 CR3: 000000026cc08004 CR4: 0000000000770ee0\n\u003e DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n\u003e DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\n\u003e PKRU: 55555554\n\u003e Call Trace:\n\u003e  \u003cTASK\u003e\n\u003e ? __die\n\u003e ? page_fault_oops\n\u003e ? __pte_offset_map_lock\n\u003e ? exc_page_fault\n\u003e ? asm_exc_page_fault\n\u003e ? wakeup_kswapd\n\u003e migrate_misplaced_page\n\u003e __handle_mm_fault\n\u003e handle_mm_fault\n\u003e do_user_addr_fault\n\u003e exc_page_fault\n\u003e asm_exc_page_fault\n\u003e RIP: 0033:0x55b897ba0808\n\u003e Code: (omitted)\n\u003e RSP: 002b:00007ffeefa821a0 EFLAGS: 00010287\n\u003e RAX: 000055b89983acd0 RBX: 00007ffeefa823f8 RCX: 000055b89983acd0\n\u003e RDX: 00007fc2f8122010 RSI: 0000000000020000 RDI: 000055b89983acd0\n\u003e RBP: 00007ffeefa821a0 R08: 0000000000000037 R09: 0000000000000075\n\u003e R10: 0000000000000000 R11: 0000000000000202 R12: 0000000000000000\n\u003e R13: 00007ffeefa82410 R14: 000055b897ba5dd8 R15: 00007fc4b8340000\n\u003e  \u003c/TASK\u003e",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26783",
          "url": "https://www.suse.com/security/cve/CVE-2024-26783"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222615 for CVE-2024-26783",
          "url": "https://bugzilla.suse.com/1222615"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26783"
    },
    {
      "cve": "CVE-2024-26787",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26787"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmmc: mmci: stm32: fix DMA API overlapping mappings warning\n\nTurning on CONFIG_DMA_API_DEBUG_SG results in the following warning:\n\nDMA-API: mmci-pl18x 48220000.mmc: cacheline tracking EEXIST,\noverlapping mappings aren\u0027t supported\nWARNING: CPU: 1 PID: 51 at kernel/dma/debug.c:568\nadd_dma_entry+0x234/0x2f4\nModules linked in:\nCPU: 1 PID: 51 Comm: kworker/1:2 Not tainted 6.1.28 #1\nHardware name: STMicroelectronics STM32MP257F-EV1 Evaluation Board (DT)\nWorkqueue: events_freezable mmc_rescan\nCall trace:\nadd_dma_entry+0x234/0x2f4\ndebug_dma_map_sg+0x198/0x350\n__dma_map_sg_attrs+0xa0/0x110\ndma_map_sg_attrs+0x10/0x2c\nsdmmc_idma_prep_data+0x80/0xc0\nmmci_prep_data+0x38/0x84\nmmci_start_data+0x108/0x2dc\nmmci_request+0xe4/0x190\n__mmc_start_request+0x68/0x140\nmmc_start_request+0x94/0xc0\nmmc_wait_for_req+0x70/0x100\nmmc_send_tuning+0x108/0x1ac\nsdmmc_execute_tuning+0x14c/0x210\nmmc_execute_tuning+0x48/0xec\nmmc_sd_init_uhs_card.part.0+0x208/0x464\nmmc_sd_init_card+0x318/0x89c\nmmc_attach_sd+0xe4/0x180\nmmc_rescan+0x244/0x320\n\nDMA API debug brings to light leaking dma-mappings as dma_map_sg and\ndma_unmap_sg are not correctly balanced.\n\nIf an error occurs in mmci_cmd_irq function, only mmci_dma_error\nfunction is called and as this API is not managed on stm32 variant,\ndma_unmap_sg is never called in this error path.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26787",
          "url": "https://www.suse.com/security/cve/CVE-2024-26787"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222781 for CVE-2024-26787",
          "url": "https://bugzilla.suse.com/1222781"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26787"
    },
    {
      "cve": "CVE-2024-26790",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26790"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndmaengine: fsl-qdma: fix SoC may hang on 16 byte unaligned read\n\nThere is chip (ls1028a) errata:\n\nThe SoC may hang on 16 byte unaligned read transactions by QDMA.\n\nUnaligned read transactions initiated by QDMA may stall in the NOC\n(Network On-Chip), causing a deadlock condition. Stalled transactions will\ntrigger completion timeouts in PCIe controller.\n\nWorkaround:\nEnable prefetch by setting the source descriptor prefetchable bit\n( SD[PF] = 1 ).\n\nImplement this workaround.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26790",
          "url": "https://www.suse.com/security/cve/CVE-2024-26790"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222784 for CVE-2024-26790",
          "url": "https://bugzilla.suse.com/1222784"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26790"
    },
    {
      "cve": "CVE-2024-26792",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26792"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: fix double free of anonymous device after snapshot creation failure\n\nWhen creating a snapshot we may do a double free of an anonymous device\nin case there\u0027s an error committing the transaction. The second free may\nresult in freeing an anonymous device number that was allocated by some\nother subsystem in the kernel or another btrfs filesystem.\n\nThe steps that lead to this:\n\n1) At ioctl.c:create_snapshot() we allocate an anonymous device number\n   and assign it to pending_snapshot-\u003eanon_dev;\n\n2) Then we call btrfs_commit_transaction() and end up at\n   transaction.c:create_pending_snapshot();\n\n3) There we call btrfs_get_new_fs_root() and pass it the anonymous device\n   number stored in pending_snapshot-\u003eanon_dev;\n\n4) btrfs_get_new_fs_root() frees that anonymous device number because\n   btrfs_lookup_fs_root() returned a root - someone else did a lookup\n   of the new root already, which could some task doing backref walking;\n\n5) After that some error happens in the transaction commit path, and at\n   ioctl.c:create_snapshot() we jump to the \u0027fail\u0027 label, and after\n   that we free again the same anonymous device number, which in the\n   meanwhile may have been reallocated somewhere else, because\n   pending_snapshot-\u003eanon_dev still has the same value as in step 1.\n\nRecently syzbot ran into this and reported the following trace:\n\n  ------------[ cut here ]------------\n  ida_free called for id=51 which is not allocated.\n  WARNING: CPU: 1 PID: 31038 at lib/idr.c:525 ida_free+0x370/0x420 lib/idr.c:525\n  Modules linked in:\n  CPU: 1 PID: 31038 Comm: syz-executor.2 Not tainted 6.8.0-rc4-syzkaller-00410-gc02197fc9076 #0\n  Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024\n  RIP: 0010:ida_free+0x370/0x420 lib/idr.c:525\n  Code: 10 42 80 3c 28 (...)\n  RSP: 0018:ffffc90015a67300 EFLAGS: 00010246\n  RAX: be5130472f5dd000 RBX: 0000000000000033 RCX: 0000000000040000\n  RDX: ffffc90009a7a000 RSI: 000000000003ffff RDI: 0000000000040000\n  RBP: ffffc90015a673f0 R08: ffffffff81577992 R09: 1ffff92002b4cdb4\n  R10: dffffc0000000000 R11: fffff52002b4cdb5 R12: 0000000000000246\n  R13: dffffc0000000000 R14: ffffffff8e256b80 R15: 0000000000000246\n  FS:  00007fca3f4b46c0(0000) GS:ffff8880b9500000(0000) knlGS:0000000000000000\n  CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n  CR2: 00007f167a17b978 CR3: 000000001ed26000 CR4: 0000000000350ef0\n  Call Trace:\n   \u003cTASK\u003e\n   btrfs_get_root_ref+0xa48/0xaf0 fs/btrfs/disk-io.c:1346\n   create_pending_snapshot+0xff2/0x2bc0 fs/btrfs/transaction.c:1837\n   create_pending_snapshots+0x195/0x1d0 fs/btrfs/transaction.c:1931\n   btrfs_commit_transaction+0xf1c/0x3740 fs/btrfs/transaction.c:2404\n   create_snapshot+0x507/0x880 fs/btrfs/ioctl.c:848\n   btrfs_mksubvol+0x5d0/0x750 fs/btrfs/ioctl.c:998\n   btrfs_mksnapshot+0xb5/0xf0 fs/btrfs/ioctl.c:1044\n   __btrfs_ioctl_snap_create+0x387/0x4b0 fs/btrfs/ioctl.c:1306\n   btrfs_ioctl_snap_create_v2+0x1ca/0x400 fs/btrfs/ioctl.c:1393\n   btrfs_ioctl+0xa74/0xd40\n   vfs_ioctl fs/ioctl.c:51 [inline]\n   __do_sys_ioctl fs/ioctl.c:871 [inline]\n   __se_sys_ioctl+0xfe/0x170 fs/ioctl.c:857\n   do_syscall_64+0xfb/0x240\n   entry_SYSCALL_64_after_hwframe+0x6f/0x77\n  RIP: 0033:0x7fca3e67dda9\n  Code: 28 00 00 00 (...)\n  RSP: 002b:00007fca3f4b40c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010\n  RAX: ffffffffffffffda RBX: 00007fca3e7abf80 RCX: 00007fca3e67dda9\n  RDX: 00000000200005c0 RSI: 0000000050009417 RDI: 0000000000000003\n  RBP: 00007fca3e6ca47a R08: 0000000000000000 R09: 0000000000000000\n  R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000\n  R13: 000000000000000b R14: 00007fca3e7abf80 R15: 00007fff6bf95658\n   \u003c/TASK\u003e\n\nWhere we get an explicit message where we attempt to free an anonymous\ndevice number that is not currently allocated. It happens in a different\ncode path from the example below, at btrfs_get_root_ref(), so this change\nmay not fix the case triggered by sy\n---truncated---",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26792",
          "url": "https://www.suse.com/security/cve/CVE-2024-26792"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222430 for CVE-2024-26792",
          "url": "https://bugzilla.suse.com/1222430"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26792"
    },
    {
      "cve": "CVE-2024-26793",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26793"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ngtp: fix use-after-free and null-ptr-deref in gtp_newlink()\n\nThe gtp_link_ops operations structure for the subsystem must be\nregistered after registering the gtp_net_ops pernet operations structure.\n\nSyzkaller hit \u0027general protection fault in gtp_genl_dump_pdp\u0027 bug:\n\n[ 1010.702740] gtp: GTP module unloaded\n[ 1010.715877] general protection fault, probably for non-canonical address 0xdffffc0000000001: 0000 [#1] SMP KASAN NOPTI\n[ 1010.715888] KASAN: null-ptr-deref in range [0x0000000000000008-0x000000000000000f]\n[ 1010.715895] CPU: 1 PID: 128616 Comm: a.out Not tainted 6.8.0-rc6-std-def-alt1 #1\n[ 1010.715899] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.0-alt1 04/01/2014\n[ 1010.715908] RIP: 0010:gtp_newlink+0x4d7/0x9c0 [gtp]\n[ 1010.715915] Code: 80 3c 02 00 0f 85 41 04 00 00 48 8b bb d8 05 00 00 e8 ed f6 ff ff 48 89 c2 48 89 c5 48 b8 00 00 00 00 00 fc ff df 48 c1 ea 03 \u003c80\u003e 3c 02 00 0f 85 4f 04 00 00 4c 89 e2 4c 8b 6d 00 48 b8 00 00 00\n[ 1010.715920] RSP: 0018:ffff888020fbf180 EFLAGS: 00010203\n[ 1010.715929] RAX: dffffc0000000000 RBX: ffff88800399c000 RCX: 0000000000000000\n[ 1010.715933] RDX: 0000000000000001 RSI: ffffffff84805280 RDI: 0000000000000282\n[ 1010.715938] RBP: 000000000000000d R08: 0000000000000001 R09: 0000000000000000\n[ 1010.715942] R10: 0000000000000001 R11: 0000000000000001 R12: ffff88800399cc80\n[ 1010.715947] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000400\n[ 1010.715953] FS:  00007fd1509ab5c0(0000) GS:ffff88805b300000(0000) knlGS:0000000000000000\n[ 1010.715958] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[ 1010.715962] CR2: 0000000000000000 CR3: 000000001c07a000 CR4: 0000000000750ee0\n[ 1010.715968] PKRU: 55555554\n[ 1010.715972] Call Trace:\n[ 1010.715985]  ? __die_body.cold+0x1a/0x1f\n[ 1010.715995]  ? die_addr+0x43/0x70\n[ 1010.716002]  ? exc_general_protection+0x199/0x2f0\n[ 1010.716016]  ? asm_exc_general_protection+0x1e/0x30\n[ 1010.716026]  ? gtp_newlink+0x4d7/0x9c0 [gtp]\n[ 1010.716034]  ? gtp_net_exit+0x150/0x150 [gtp]\n[ 1010.716042]  __rtnl_newlink+0x1063/0x1700\n[ 1010.716051]  ? rtnl_setlink+0x3c0/0x3c0\n[ 1010.716063]  ? is_bpf_text_address+0xc0/0x1f0\n[ 1010.716070]  ? kernel_text_address.part.0+0xbb/0xd0\n[ 1010.716076]  ? __kernel_text_address+0x56/0xa0\n[ 1010.716084]  ? unwind_get_return_address+0x5a/0xa0\n[ 1010.716091]  ? create_prof_cpu_mask+0x30/0x30\n[ 1010.716098]  ? arch_stack_walk+0x9e/0xf0\n[ 1010.716106]  ? stack_trace_save+0x91/0xd0\n[ 1010.716113]  ? stack_trace_consume_entry+0x170/0x170\n[ 1010.716121]  ? __lock_acquire+0x15c5/0x5380\n[ 1010.716139]  ? mark_held_locks+0x9e/0xe0\n[ 1010.716148]  ? kmem_cache_alloc_trace+0x35f/0x3c0\n[ 1010.716155]  ? __rtnl_newlink+0x1700/0x1700\n[ 1010.716160]  rtnl_newlink+0x69/0xa0\n[ 1010.716166]  rtnetlink_rcv_msg+0x43b/0xc50\n[ 1010.716172]  ? rtnl_fdb_dump+0x9f0/0x9f0\n[ 1010.716179]  ? lock_acquire+0x1fe/0x560\n[ 1010.716188]  ? netlink_deliver_tap+0x12f/0xd50\n[ 1010.716196]  netlink_rcv_skb+0x14d/0x440\n[ 1010.716202]  ? rtnl_fdb_dump+0x9f0/0x9f0\n[ 1010.716208]  ? netlink_ack+0xab0/0xab0\n[ 1010.716213]  ? netlink_deliver_tap+0x202/0xd50\n[ 1010.716220]  ? netlink_deliver_tap+0x218/0xd50\n[ 1010.716226]  ? __virt_addr_valid+0x30b/0x590\n[ 1010.716233]  netlink_unicast+0x54b/0x800\n[ 1010.716240]  ? netlink_attachskb+0x870/0x870\n[ 1010.716248]  ? __check_object_size+0x2de/0x3b0\n[ 1010.716254]  netlink_sendmsg+0x938/0xe40\n[ 1010.716261]  ? netlink_unicast+0x800/0x800\n[ 1010.716269]  ? __import_iovec+0x292/0x510\n[ 1010.716276]  ? netlink_unicast+0x800/0x800\n[ 1010.716284]  __sock_sendmsg+0x159/0x190\n[ 1010.716290]  ____sys_sendmsg+0x712/0x880\n[ 1010.716297]  ? sock_write_iter+0x3d0/0x3d0\n[ 1010.716304]  ? __ia32_sys_recvmmsg+0x270/0x270\n[ 1010.716309]  ? lock_acquire+0x1fe/0x560\n[ 1010.716315]  ? drain_array_locked+0x90/0x90\n[ 1010.716324]  ___sys_sendmsg+0xf8/0x170\n[ 1010.716331]  ? sendmsg_copy_msghdr+0x170/0x170\n[ 1010.716337]  ? lockdep_init_map\n---truncated---",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26793",
          "url": "https://www.suse.com/security/cve/CVE-2024-26793"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222428 for CVE-2024-26793",
          "url": "https://bugzilla.suse.com/1222428"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26793"
    },
    {
      "cve": "CVE-2024-26798",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26798"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfbcon: always restore the old font data in fbcon_do_set_font()\n\nCommit a5a923038d70 (fbdev: fbcon: Properly revert changes when\nvc_resize() failed) started restoring old font data upon failure (of\nvc_resize()). But it performs so only for user fonts. It means that the\n\"system\"/internal fonts are not restored at all. So in result, the very\nfirst call to fbcon_do_set_font() performs no restore at all upon\nfailing vc_resize().\n\nThis can be reproduced by Syzkaller to crash the system on the next\ninvocation of font_get(). It\u0027s rather hard to hit the allocation failure\nin vc_resize() on the first font_set(), but not impossible. Esp. if\nfault injection is used to aid the execution/failure. It was\ndemonstrated by Sirius:\n  BUG: unable to handle page fault for address: fffffffffffffff8\n  #PF: supervisor read access in kernel mode\n  #PF: error_code(0x0000) - not-present page\n  PGD cb7b067 P4D cb7b067 PUD cb7d067 PMD 0\n  Oops: 0000 [#1] PREEMPT SMP KASAN\n  CPU: 1 PID: 8007 Comm: poc Not tainted 6.7.0-g9d1694dc91ce #20\n  Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.15.0-1 04/01/2014\n  RIP: 0010:fbcon_get_font+0x229/0x800 drivers/video/fbdev/core/fbcon.c:2286\n  Call Trace:\n   \u003cTASK\u003e\n   con_font_get drivers/tty/vt/vt.c:4558 [inline]\n   con_font_op+0x1fc/0xf20 drivers/tty/vt/vt.c:4673\n   vt_k_ioctl drivers/tty/vt/vt_ioctl.c:474 [inline]\n   vt_ioctl+0x632/0x2ec0 drivers/tty/vt/vt_ioctl.c:752\n   tty_ioctl+0x6f8/0x1570 drivers/tty/tty_io.c:2803\n   vfs_ioctl fs/ioctl.c:51 [inline]\n  ...\n\nSo restore the font data in any case, not only for user fonts. Note the\nlater \u0027if\u0027 is now protected by \u0027old_userfont\u0027 and not \u0027old_data\u0027 as the\nlatter is always set now. (And it is supposed to be non-NULL. Otherwise\nwe would see the bug above again.)",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26798",
          "url": "https://www.suse.com/security/cve/CVE-2024-26798"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222798 for CVE-2024-26798",
          "url": "https://bugzilla.suse.com/1222798"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26798"
    },
    {
      "cve": "CVE-2024-26805",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26805"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetlink: Fix kernel-infoleak-after-free in __skb_datagram_iter\n\nsyzbot reported the following uninit-value access issue [1]:\n\nnetlink_to_full_skb() creates a new `skb` and puts the `skb-\u003edata`\npassed as a 1st arg of netlink_to_full_skb() onto new `skb`. The data\nsize is specified as `len` and passed to skb_put_data(). This `len`\nis based on `skb-\u003eend` that is not data offset but buffer offset. The\n`skb-\u003eend` contains data and tailroom. Since the tailroom is not\ninitialized when the new `skb` created, KMSAN detects uninitialized\nmemory area when copying the data.\n\nThis patch resolved this issue by correct the len from `skb-\u003eend` to\n`skb-\u003elen`, which is the actual data offset.\n\nBUG: KMSAN: kernel-infoleak-after-free in instrument_copy_to_user include/linux/instrumented.h:114 [inline]\nBUG: KMSAN: kernel-infoleak-after-free in copy_to_user_iter lib/iov_iter.c:24 [inline]\nBUG: KMSAN: kernel-infoleak-after-free in iterate_ubuf include/linux/iov_iter.h:29 [inline]\nBUG: KMSAN: kernel-infoleak-after-free in iterate_and_advance2 include/linux/iov_iter.h:245 [inline]\nBUG: KMSAN: kernel-infoleak-after-free in iterate_and_advance include/linux/iov_iter.h:271 [inline]\nBUG: KMSAN: kernel-infoleak-after-free in _copy_to_iter+0x364/0x2520 lib/iov_iter.c:186\n instrument_copy_to_user include/linux/instrumented.h:114 [inline]\n copy_to_user_iter lib/iov_iter.c:24 [inline]\n iterate_ubuf include/linux/iov_iter.h:29 [inline]\n iterate_and_advance2 include/linux/iov_iter.h:245 [inline]\n iterate_and_advance include/linux/iov_iter.h:271 [inline]\n _copy_to_iter+0x364/0x2520 lib/iov_iter.c:186\n copy_to_iter include/linux/uio.h:197 [inline]\n simple_copy_to_iter+0x68/0xa0 net/core/datagram.c:532\n __skb_datagram_iter+0x123/0xdc0 net/core/datagram.c:420\n skb_copy_datagram_iter+0x5c/0x200 net/core/datagram.c:546\n skb_copy_datagram_msg include/linux/skbuff.h:3960 [inline]\n packet_recvmsg+0xd9c/0x2000 net/packet/af_packet.c:3482\n sock_recvmsg_nosec net/socket.c:1044 [inline]\n sock_recvmsg net/socket.c:1066 [inline]\n sock_read_iter+0x467/0x580 net/socket.c:1136\n call_read_iter include/linux/fs.h:2014 [inline]\n new_sync_read fs/read_write.c:389 [inline]\n vfs_read+0x8f6/0xe00 fs/read_write.c:470\n ksys_read+0x20f/0x4c0 fs/read_write.c:613\n __do_sys_read fs/read_write.c:623 [inline]\n __se_sys_read fs/read_write.c:621 [inline]\n __x64_sys_read+0x93/0xd0 fs/read_write.c:621\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n do_syscall_64+0x44/0x110 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x63/0x6b\n\nUninit was stored to memory at:\n skb_put_data include/linux/skbuff.h:2622 [inline]\n netlink_to_full_skb net/netlink/af_netlink.c:181 [inline]\n __netlink_deliver_tap_skb net/netlink/af_netlink.c:298 [inline]\n __netlink_deliver_tap+0x5be/0xc90 net/netlink/af_netlink.c:325\n netlink_deliver_tap net/netlink/af_netlink.c:338 [inline]\n netlink_deliver_tap_kernel net/netlink/af_netlink.c:347 [inline]\n netlink_unicast_kernel net/netlink/af_netlink.c:1341 [inline]\n netlink_unicast+0x10f1/0x1250 net/netlink/af_netlink.c:1368\n netlink_sendmsg+0x1238/0x13d0 net/netlink/af_netlink.c:1910\n sock_sendmsg_nosec net/socket.c:730 [inline]\n __sock_sendmsg net/socket.c:745 [inline]\n ____sys_sendmsg+0x9c2/0xd60 net/socket.c:2584\n ___sys_sendmsg+0x28d/0x3c0 net/socket.c:2638\n __sys_sendmsg net/socket.c:2667 [inline]\n __do_sys_sendmsg net/socket.c:2676 [inline]\n __se_sys_sendmsg net/socket.c:2674 [inline]\n __x64_sys_sendmsg+0x307/0x490 net/socket.c:2674\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n do_syscall_64+0x44/0x110 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x63/0x6b\n\nUninit was created at:\n free_pages_prepare mm/page_alloc.c:1087 [inline]\n free_unref_page_prepare+0xb0/0xa40 mm/page_alloc.c:2347\n free_unref_page_list+0xeb/0x1100 mm/page_alloc.c:2533\n release_pages+0x23d3/0x2410 mm/swap.c:1042\n free_pages_and_swap_cache+0xd9/0xf0 mm/swap_state.c:316\n tlb_batch_pages\n---truncated---",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26805",
          "url": "https://www.suse.com/security/cve/CVE-2024-26805"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222630 for CVE-2024-26805",
          "url": "https://bugzilla.suse.com/1222630"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26805"
    },
    {
      "cve": "CVE-2024-26807",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26807"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nBoth cadence-quadspi -\u003eruntime_suspend() and -\u003eruntime_resume()\nimplementations start with:\n\n\tstruct cqspi_st *cqspi = dev_get_drvdata(dev);\n\tstruct spi_controller *host = dev_get_drvdata(dev);\n\nThis obviously cannot be correct, unless \"struct cqspi_st\" is the\nfirst member of \" struct spi_controller\", or the other way around, but\nit is not the case. \"struct spi_controller\" is allocated by\ndevm_spi_alloc_host(), which allocates an extra amount of memory for\nprivate data, used to store \"struct cqspi_st\".\n\nThe -\u003eprobe() function of the cadence-quadspi driver then sets the\ndevice drvdata to store the address of the \"struct cqspi_st\"\nstructure. Therefore:\n\n\tstruct cqspi_st *cqspi = dev_get_drvdata(dev);\n\nis correct, but:\n\n\tstruct spi_controller *host = dev_get_drvdata(dev);\n\nis not, as it makes \"host\" point not to a \"struct spi_controller\" but\nto the same \"struct cqspi_st\" structure as above.\n\nThis obviously leads to bad things (memory corruption, kernel crashes)\ndirectly during -\u003eprobe(), as -\u003eprobe() enables the device using PM\nruntime, leading the -\u003eruntime_resume() hook being called, which in\nturns calls spi_controller_resume() with the wrong pointer.\n\nThis has at least been reported [0] to cause a kernel crash, but the\nexact behavior will depend on the memory contents.\n\n[0] https://lore.kernel.org/all/20240226121803.5a7r5wkpbbowcxgx@dhruva/\n\nThis issue potentially affects all platforms that are currently using\nthe cadence-quadspi driver.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26807",
          "url": "https://www.suse.com/security/cve/CVE-2024-26807"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222801 for CVE-2024-26807",
          "url": "https://bugzilla.suse.com/1222801"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26807"
    },
    {
      "cve": "CVE-2024-26816",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26816"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nx86, relocs: Ignore relocations in .notes section\n\nWhen building with CONFIG_XEN_PV=y, .text symbols are emitted into\nthe .notes section so that Xen can find the \"startup_xen\" entry point.\nThis information is used prior to booting the kernel, so relocations\nare not useful. In fact, performing relocations against the .notes\nsection means that the KASLR base is exposed since /sys/kernel/notes\nis world-readable.\n\nTo avoid leaking the KASLR base without breaking unprivileged tools that\nare expecting to read /sys/kernel/notes, skip performing relocations in\nthe .notes section. The values readable in .notes are then identical to\nthose found in System.map.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26816",
          "url": "https://www.suse.com/security/cve/CVE-2024-26816"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222624 for CVE-2024-26816",
          "url": "https://bugzilla.suse.com/1222624"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26816"
    },
    {
      "cve": "CVE-2024-26817",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26817"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\namdkfd: use calloc instead of kzalloc to avoid integer overflow\n\nThis uses calloc instead of doing the multiplication which might\noverflow.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26817",
          "url": "https://www.suse.com/security/cve/CVE-2024-26817"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222812 for CVE-2024-26817",
          "url": "https://bugzilla.suse.com/1222812"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26817"
    },
    {
      "cve": "CVE-2024-26820",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26820"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nhv_netvsc: Register VF in netvsc_probe if NET_DEVICE_REGISTER missed\n\nIf hv_netvsc driver is unloaded and reloaded, the NET_DEVICE_REGISTER\nhandler cannot perform VF register successfully as the register call\nis received before netvsc_probe is finished. This is because we\nregister register_netdevice_notifier() very early( even before\nvmbus_driver_register()).\nTo fix this, we try to register each such matching VF( if it is visible\nas a netdevice) at the end of netvsc_probe.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26820",
          "url": "https://www.suse.com/security/cve/CVE-2024-26820"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223078 for CVE-2024-26820",
          "url": "https://bugzilla.suse.com/1223078"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26820"
    },
    {
      "cve": "CVE-2024-26825",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26825"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnfc: nci: free rx_data_reassembly skb on NCI device cleanup\n\nrx_data_reassembly skb is stored during NCI data exchange for processing\nfragmented packets. It is dropped only when the last fragment is processed\nor when an NTF packet with NCI_OP_RF_DEACTIVATE_NTF opcode is received.\nHowever, the NCI device may be deallocated before that which leads to skb\nleak.\n\nAs by design the rx_data_reassembly skb is bound to the NCI device and\nnothing prevents the device to be freed before the skb is processed in\nsome way and cleaned, free it on the NCI device cleanup.\n\nFound by Linux Verification Center (linuxtesting.org) with Syzkaller.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26825",
          "url": "https://www.suse.com/security/cve/CVE-2024-26825"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223065 for CVE-2024-26825",
          "url": "https://bugzilla.suse.com/1223065"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26825"
    },
    {
      "cve": "CVE-2024-26830",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26830"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ni40e: Do not allow untrusted VF to remove administratively set MAC\n\nCurrently when PF administratively sets VF\u0027s MAC address and the VF\nis put down (VF tries to delete all MACs) then the MAC is removed\nfrom MAC filters and primary VF MAC is zeroed.\n\nDo not allow untrusted VF to remove primary MAC when it was set\nadministratively by PF.\n\nReproducer:\n1) Create VF\n2) Set VF interface up\n3) Administratively set the VF\u0027s MAC\n4) Put VF interface down\n\n[root@host ~]# echo 1 \u003e /sys/class/net/enp2s0f0/device/sriov_numvfs\n[root@host ~]# ip link set enp2s0f0v0 up\n[root@host ~]# ip link set enp2s0f0 vf 0 mac fe:6c:b5:da:c7:7d\n[root@host ~]# ip link show enp2s0f0\n23: enp2s0f0: \u003cBROADCAST,MULTICAST,UP,LOWER_UP\u003e mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000\n    link/ether 3c:ec:ef:b7:dd:04 brd ff:ff:ff:ff:ff:ff\n    vf 0     link/ether fe:6c:b5:da:c7:7d brd ff:ff:ff:ff:ff:ff, spoof checking on, link-state auto, trust off\n[root@host ~]# ip link set enp2s0f0v0 down\n[root@host ~]# ip link show enp2s0f0\n23: enp2s0f0: \u003cBROADCAST,MULTICAST,UP,LOWER_UP\u003e mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000\n    link/ether 3c:ec:ef:b7:dd:04 brd ff:ff:ff:ff:ff:ff\n    vf 0     link/ether 00:00:00:00:00:00 brd ff:ff:ff:ff:ff:ff, spoof checking on, link-state auto, trust off",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26830",
          "url": "https://www.suse.com/security/cve/CVE-2024-26830"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223012 for CVE-2024-26830",
          "url": "https://bugzilla.suse.com/1223012"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26830"
    },
    {
      "cve": "CVE-2024-26833",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26833"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/display: Fix memory leak in dm_sw_fini()\n\nAfter destroying dmub_srv, the memory associated with it is\nnot freed, causing a memory leak:\n\nunreferenced object 0xffff896302b45800 (size 1024):\n  comm \"(udev-worker)\", pid 222, jiffies 4294894636\n  hex dump (first 32 bytes):\n    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................\n    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................\n  backtrace (crc 6265fd77):\n    [\u003cffffffff993495ed\u003e] kmalloc_trace+0x29d/0x340\n    [\u003cffffffffc0ea4a94\u003e] dm_dmub_sw_init+0xb4/0x450 [amdgpu]\n    [\u003cffffffffc0ea4e55\u003e] dm_sw_init+0x15/0x2b0 [amdgpu]\n    [\u003cffffffffc0ba8557\u003e] amdgpu_device_init+0x1417/0x24e0 [amdgpu]\n    [\u003cffffffffc0bab285\u003e] amdgpu_driver_load_kms+0x15/0x190 [amdgpu]\n    [\u003cffffffffc0ba09c7\u003e] amdgpu_pci_probe+0x187/0x4e0 [amdgpu]\n    [\u003cffffffff9968fd1e\u003e] local_pci_probe+0x3e/0x90\n    [\u003cffffffff996918a3\u003e] pci_device_probe+0xc3/0x230\n    [\u003cffffffff99805872\u003e] really_probe+0xe2/0x480\n    [\u003cffffffff99805c98\u003e] __driver_probe_device+0x78/0x160\n    [\u003cffffffff99805daf\u003e] driver_probe_device+0x1f/0x90\n    [\u003cffffffff9980601e\u003e] __driver_attach+0xce/0x1c0\n    [\u003cffffffff99803170\u003e] bus_for_each_dev+0x70/0xc0\n    [\u003cffffffff99804822\u003e] bus_add_driver+0x112/0x210\n    [\u003cffffffff99807245\u003e] driver_register+0x55/0x100\n    [\u003cffffffff990012d1\u003e] do_one_initcall+0x41/0x300\n\nFix this by freeing dmub_srv after destroying it.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26833",
          "url": "https://www.suse.com/security/cve/CVE-2024-26833"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223036 for CVE-2024-26833",
          "url": "https://bugzilla.suse.com/1223036"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26833"
    },
    {
      "cve": "CVE-2024-26836",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26836"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nplatform/x86: think-lmi: Fix password opcode ordering for workstations\n\nThe Lenovo workstations require the password opcode to be run before\nthe attribute value is changed (if Admin password is enabled).\n\nTested on some Thinkpads to confirm they are OK with this order too.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26836",
          "url": "https://www.suse.com/security/cve/CVE-2024-26836"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222968 for CVE-2024-26836",
          "url": "https://bugzilla.suse.com/1222968"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26836"
    },
    {
      "cve": "CVE-2024-26843",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26843"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nefi: runtime: Fix potential overflow of soft-reserved region size\n\nmd_size will have been narrowed if we have \u003e= 4GB worth of pages in a\nsoft-reserved region.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26843",
          "url": "https://www.suse.com/security/cve/CVE-2024-26843"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223014 for CVE-2024-26843",
          "url": "https://bugzilla.suse.com/1223014"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26843"
    },
    {
      "cve": "CVE-2024-26848",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26848"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26848",
          "url": "https://www.suse.com/security/cve/CVE-2024-26848"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223030 for CVE-2024-26848",
          "url": "https://bugzilla.suse.com/1223030"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "low"
        }
      ],
      "title": "CVE-2024-26848"
    },
    {
      "cve": "CVE-2024-26852",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26852"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/ipv6: avoid possible UAF in ip6_route_mpath_notify()\n\nsyzbot found another use-after-free in ip6_route_mpath_notify() [1]\n\nCommit f7225172f25a (\"net/ipv6: prevent use after free in\nip6_route_mpath_notify\") was not able to fix the root cause.\n\nWe need to defer the fib6_info_release() calls after\nip6_route_mpath_notify(), in the cleanup phase.\n\n[1]\nBUG: KASAN: slab-use-after-free in rt6_fill_node+0x1460/0x1ac0\nRead of size 4 at addr ffff88809a07fc64 by task syz-executor.2/23037\n\nCPU: 0 PID: 23037 Comm: syz-executor.2 Not tainted 6.8.0-rc4-syzkaller-01035-gea7f3cfaa588 #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024\nCall Trace:\n \u003cTASK\u003e\n  __dump_stack lib/dump_stack.c:88 [inline]\n  dump_stack_lvl+0x1e7/0x2e0 lib/dump_stack.c:106\n  print_address_description mm/kasan/report.c:377 [inline]\n  print_report+0x167/0x540 mm/kasan/report.c:488\n  kasan_report+0x142/0x180 mm/kasan/report.c:601\n rt6_fill_node+0x1460/0x1ac0\n  inet6_rt_notify+0x13b/0x290 net/ipv6/route.c:6184\n  ip6_route_mpath_notify net/ipv6/route.c:5198 [inline]\n  ip6_route_multipath_add net/ipv6/route.c:5404 [inline]\n  inet6_rtm_newroute+0x1d0f/0x2300 net/ipv6/route.c:5517\n  rtnetlink_rcv_msg+0x885/0x1040 net/core/rtnetlink.c:6597\n  netlink_rcv_skb+0x1e3/0x430 net/netlink/af_netlink.c:2543\n  netlink_unicast_kernel net/netlink/af_netlink.c:1341 [inline]\n  netlink_unicast+0x7ea/0x980 net/netlink/af_netlink.c:1367\n  netlink_sendmsg+0xa3b/0xd70 net/netlink/af_netlink.c:1908\n  sock_sendmsg_nosec net/socket.c:730 [inline]\n  __sock_sendmsg+0x221/0x270 net/socket.c:745\n  ____sys_sendmsg+0x525/0x7d0 net/socket.c:2584\n  ___sys_sendmsg net/socket.c:2638 [inline]\n  __sys_sendmsg+0x2b0/0x3a0 net/socket.c:2667\n do_syscall_64+0xf9/0x240\n entry_SYSCALL_64_after_hwframe+0x6f/0x77\nRIP: 0033:0x7f73dd87dda9\nCode: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 \u003c48\u003e 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48\nRSP: 002b:00007f73de6550c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e\nRAX: ffffffffffffffda RBX: 00007f73dd9ac050 RCX: 00007f73dd87dda9\nRDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000005\nRBP: 00007f73dd8ca47a R08: 0000000000000000 R09: 0000000000000000\nR10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000\nR13: 000000000000006e R14: 00007f73dd9ac050 R15: 00007ffdbdeb7858\n \u003c/TASK\u003e\n\nAllocated by task 23037:\n  kasan_save_stack mm/kasan/common.c:47 [inline]\n  kasan_save_track+0x3f/0x80 mm/kasan/common.c:68\n  poison_kmalloc_redzone mm/kasan/common.c:372 [inline]\n  __kasan_kmalloc+0x98/0xb0 mm/kasan/common.c:389\n  kasan_kmalloc include/linux/kasan.h:211 [inline]\n  __do_kmalloc_node mm/slub.c:3981 [inline]\n  __kmalloc+0x22e/0x490 mm/slub.c:3994\n  kmalloc include/linux/slab.h:594 [inline]\n  kzalloc include/linux/slab.h:711 [inline]\n  fib6_info_alloc+0x2e/0xf0 net/ipv6/ip6_fib.c:155\n  ip6_route_info_create+0x445/0x12b0 net/ipv6/route.c:3758\n  ip6_route_multipath_add net/ipv6/route.c:5298 [inline]\n  inet6_rtm_newroute+0x744/0x2300 net/ipv6/route.c:5517\n  rtnetlink_rcv_msg+0x885/0x1040 net/core/rtnetlink.c:6597\n  netlink_rcv_skb+0x1e3/0x430 net/netlink/af_netlink.c:2543\n  netlink_unicast_kernel net/netlink/af_netlink.c:1341 [inline]\n  netlink_unicast+0x7ea/0x980 net/netlink/af_netlink.c:1367\n  netlink_sendmsg+0xa3b/0xd70 net/netlink/af_netlink.c:1908\n  sock_sendmsg_nosec net/socket.c:730 [inline]\n  __sock_sendmsg+0x221/0x270 net/socket.c:745\n  ____sys_sendmsg+0x525/0x7d0 net/socket.c:2584\n  ___sys_sendmsg net/socket.c:2638 [inline]\n  __sys_sendmsg+0x2b0/0x3a0 net/socket.c:2667\n do_syscall_64+0xf9/0x240\n entry_SYSCALL_64_after_hwframe+0x6f/0x77\n\nFreed by task 16:\n  kasan_save_stack mm/kasan/common.c:47 [inline]\n  kasan_save_track+0x3f/0x80 mm/kasan/common.c:68\n  kasan_save_free_info+0x4e/0x60 mm/kasan/generic.c:640\n  poison_slab_object+0xa6/0xe0 m\n---truncated---",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26852",
          "url": "https://www.suse.com/security/cve/CVE-2024-26852"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223057 for CVE-2024-26852",
          "url": "https://bugzilla.suse.com/1223057"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223059 for CVE-2024-26852",
          "url": "https://bugzilla.suse.com/1223059"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "important"
        }
      ],
      "title": "CVE-2024-26852"
    },
    {
      "cve": "CVE-2024-26853",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26853"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nigc: avoid returning frame twice in XDP_REDIRECT\n\nWhen a frame can not be transmitted in XDP_REDIRECT\n(e.g. due to a full queue), it is necessary to free\nit by calling xdp_return_frame_rx_napi.\n\nHowever, this is the responsibility of the caller of\nthe ndo_xdp_xmit (see for example bq_xmit_all in\nkernel/bpf/devmap.c) and thus calling it inside\nigc_xdp_xmit (which is the ndo_xdp_xmit of the igc\ndriver) as well will lead to memory corruption.\n\nIn fact, bq_xmit_all expects that it can return all\nframes after the last successfully transmitted one.\nTherefore, break for the first not transmitted frame,\nbut do not call xdp_return_frame_rx_napi in igc_xdp_xmit.\nThis is equally implemented in other Intel drivers\nsuch as the igb.\n\nThere are two alternatives to this that were rejected:\n1. Return num_frames as all the frames would have been\n   transmitted and release them inside igc_xdp_xmit.\n   While it might work technically, it is not what\n   the return value is meant to represent (i.e. the\n   number of SUCCESSFULLY transmitted packets).\n2. Rework kernel/bpf/devmap.c and all drivers to\n   support non-consecutively dropped packets.\n   Besides being complex, it likely has a negative\n   performance impact without a significant gain\n   since it is anyway unlikely that the next frame\n   can be transmitted if the previous one was dropped.\n\nThe memory corruption can be reproduced with\nthe following script which leads to a kernel panic\nafter a few seconds.  It basically generates more\ntraffic than a i225 NIC can transmit and pushes it\nvia XDP_REDIRECT from a virtual interface to the\nphysical interface where frames get dropped.\n\n   #!/bin/bash\n   INTERFACE=enp4s0\n   INTERFACE_IDX=`cat /sys/class/net/$INTERFACE/ifindex`\n\n   sudo ip link add dev veth1 type veth peer name veth2\n   sudo ip link set up $INTERFACE\n   sudo ip link set up veth1\n   sudo ip link set up veth2\n\n   cat \u003c\u003c EOF \u003e redirect.bpf.c\n\n   SEC(\"prog\")\n   int redirect(struct xdp_md *ctx)\n   {\n       return bpf_redirect($INTERFACE_IDX, 0);\n   }\n\n   char _license[] SEC(\"license\") = \"GPL\";\n   EOF\n   clang -O2 -g -Wall -target bpf -c redirect.bpf.c -o redirect.bpf.o\n   sudo ip link set veth2 xdp obj redirect.bpf.o\n\n   cat \u003c\u003c EOF \u003e pass.bpf.c\n\n   SEC(\"prog\")\n   int pass(struct xdp_md *ctx)\n   {\n       return XDP_PASS;\n   }\n\n   char _license[] SEC(\"license\") = \"GPL\";\n   EOF\n   clang -O2 -g -Wall -target bpf -c pass.bpf.c -o pass.bpf.o\n   sudo ip link set $INTERFACE xdp obj pass.bpf.o\n\n   cat \u003c\u003c EOF \u003e trafgen.cfg\n\n   {\n     /* Ethernet Header */\n     0xe8, 0x6a, 0x64, 0x41, 0xbf, 0x46,\n     0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF,\n     const16(ETH_P_IP),\n\n     /* IPv4 Header */\n     0b01000101, 0,   # IPv4 version, IHL, TOS\n     const16(1028),   # IPv4 total length (UDP length + 20 bytes (IP header))\n     const16(2),      # IPv4 ident\n     0b01000000, 0,   # IPv4 flags, fragmentation off\n     64,              # IPv4 TTL\n     17,              # Protocol UDP\n     csumip(14, 33),  # IPv4 checksum\n\n     /* UDP Header */\n     10,  0, 1, 1,    # IP Src - adapt as needed\n     10,  0, 1, 2,    # IP Dest - adapt as needed\n     const16(6666),   # UDP Src Port\n     const16(6666),   # UDP Dest Port\n     const16(1008),   # UDP length (UDP header 8 bytes + payload length)\n     csumudp(14, 34), # UDP checksum\n\n     /* Payload */\n     fill(\u0027W\u0027, 1000),\n   }\n   EOF\n\n   sudo trafgen -i trafgen.cfg -b3000MB -o veth1 --cpp",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26853",
          "url": "https://www.suse.com/security/cve/CVE-2024-26853"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223061 for CVE-2024-26853",
          "url": "https://bugzilla.suse.com/1223061"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26853"
    },
    {
      "cve": "CVE-2024-26855",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26855"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: ice: Fix potential NULL pointer dereference in ice_bridge_setlink()\n\nThe function ice_bridge_setlink() may encounter a NULL pointer dereference\nif nlmsg_find_attr() returns NULL and br_spec is dereferenced subsequently\nin nla_for_each_nested(). To address this issue, add a check to ensure that\nbr_spec is not NULL before proceeding with the nested attribute iteration.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26855",
          "url": "https://www.suse.com/security/cve/CVE-2024-26855"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223051 for CVE-2024-26855",
          "url": "https://bugzilla.suse.com/1223051"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26855"
    },
    {
      "cve": "CVE-2024-26856",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26856"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: sparx5: Fix use after free inside sparx5_del_mact_entry\n\nBased on the static analyzis of the code it looks like when an entry\nfrom the MAC table was removed, the entry was still used after being\nfreed. More precise the vid of the mac_entry was used after calling\ndevm_kfree on the mac_entry.\nThe fix consists in first using the vid of the mac_entry to delete the\nentry from the HW and after that to free it.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26856",
          "url": "https://www.suse.com/security/cve/CVE-2024-26856"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223052 for CVE-2024-26856",
          "url": "https://bugzilla.suse.com/1223052"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26856"
    },
    {
      "cve": "CVE-2024-26857",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26857"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ngeneve: make sure to pull inner header in geneve_rx()\n\nsyzbot triggered a bug in geneve_rx() [1]\n\nIssue is similar to the one I fixed in commit 8d975c15c0cd\n(\"ip6_tunnel: make sure to pull inner header in __ip6_tnl_rcv()\")\n\nWe have to save skb-\u003enetwork_header in a temporary variable\nin order to be able to recompute the network_header pointer\nafter a pskb_inet_may_pull() call.\n\npskb_inet_may_pull() makes sure the needed headers are in skb-\u003ehead.\n\n[1]\nBUG: KMSAN: uninit-value in IP_ECN_decapsulate include/net/inet_ecn.h:302 [inline]\n BUG: KMSAN: uninit-value in geneve_rx drivers/net/geneve.c:279 [inline]\n BUG: KMSAN: uninit-value in geneve_udp_encap_recv+0x36f9/0x3c10 drivers/net/geneve.c:391\n  IP_ECN_decapsulate include/net/inet_ecn.h:302 [inline]\n  geneve_rx drivers/net/geneve.c:279 [inline]\n  geneve_udp_encap_recv+0x36f9/0x3c10 drivers/net/geneve.c:391\n  udp_queue_rcv_one_skb+0x1d39/0x1f20 net/ipv4/udp.c:2108\n  udp_queue_rcv_skb+0x6ae/0x6e0 net/ipv4/udp.c:2186\n  udp_unicast_rcv_skb+0x184/0x4b0 net/ipv4/udp.c:2346\n  __udp4_lib_rcv+0x1c6b/0x3010 net/ipv4/udp.c:2422\n  udp_rcv+0x7d/0xa0 net/ipv4/udp.c:2604\n  ip_protocol_deliver_rcu+0x264/0x1300 net/ipv4/ip_input.c:205\n  ip_local_deliver_finish+0x2b8/0x440 net/ipv4/ip_input.c:233\n  NF_HOOK include/linux/netfilter.h:314 [inline]\n  ip_local_deliver+0x21f/0x490 net/ipv4/ip_input.c:254\n  dst_input include/net/dst.h:461 [inline]\n  ip_rcv_finish net/ipv4/ip_input.c:449 [inline]\n  NF_HOOK include/linux/netfilter.h:314 [inline]\n  ip_rcv+0x46f/0x760 net/ipv4/ip_input.c:569\n  __netif_receive_skb_one_core net/core/dev.c:5534 [inline]\n  __netif_receive_skb+0x1a6/0x5a0 net/core/dev.c:5648\n  process_backlog+0x480/0x8b0 net/core/dev.c:5976\n  __napi_poll+0xe3/0x980 net/core/dev.c:6576\n  napi_poll net/core/dev.c:6645 [inline]\n  net_rx_action+0x8b8/0x1870 net/core/dev.c:6778\n  __do_softirq+0x1b7/0x7c5 kernel/softirq.c:553\n  do_softirq+0x9a/0xf0 kernel/softirq.c:454\n  __local_bh_enable_ip+0x9b/0xa0 kernel/softirq.c:381\n  local_bh_enable include/linux/bottom_half.h:33 [inline]\n  rcu_read_unlock_bh include/linux/rcupdate.h:820 [inline]\n  __dev_queue_xmit+0x2768/0x51c0 net/core/dev.c:4378\n  dev_queue_xmit include/linux/netdevice.h:3171 [inline]\n  packet_xmit+0x9c/0x6b0 net/packet/af_packet.c:276\n  packet_snd net/packet/af_packet.c:3081 [inline]\n  packet_sendmsg+0x8aef/0x9f10 net/packet/af_packet.c:3113\n  sock_sendmsg_nosec net/socket.c:730 [inline]\n  __sock_sendmsg net/socket.c:745 [inline]\n  __sys_sendto+0x735/0xa10 net/socket.c:2191\n  __do_sys_sendto net/socket.c:2203 [inline]\n  __se_sys_sendto net/socket.c:2199 [inline]\n  __x64_sys_sendto+0x125/0x1c0 net/socket.c:2199\n  do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n  do_syscall_64+0xcf/0x1e0 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x63/0x6b\n\nUninit was created at:\n  slab_post_alloc_hook mm/slub.c:3819 [inline]\n  slab_alloc_node mm/slub.c:3860 [inline]\n  kmem_cache_alloc_node+0x5cb/0xbc0 mm/slub.c:3903\n  kmalloc_reserve+0x13d/0x4a0 net/core/skbuff.c:560\n  __alloc_skb+0x352/0x790 net/core/skbuff.c:651\n  alloc_skb include/linux/skbuff.h:1296 [inline]\n  alloc_skb_with_frags+0xc8/0xbd0 net/core/skbuff.c:6394\n  sock_alloc_send_pskb+0xa80/0xbf0 net/core/sock.c:2783\n  packet_alloc_skb net/packet/af_packet.c:2930 [inline]\n  packet_snd net/packet/af_packet.c:3024 [inline]\n  packet_sendmsg+0x70c2/0x9f10 net/packet/af_packet.c:3113\n  sock_sendmsg_nosec net/socket.c:730 [inline]\n  __sock_sendmsg net/socket.c:745 [inline]\n  __sys_sendto+0x735/0xa10 net/socket.c:2191\n  __do_sys_sendto net/socket.c:2203 [inline]\n  __se_sys_sendto net/socket.c:2199 [inline]\n  __x64_sys_sendto+0x125/0x1c0 net/socket.c:2199\n  do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n  do_syscall_64+0xcf/0x1e0 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x63/0x6b",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26857",
          "url": "https://www.suse.com/security/cve/CVE-2024-26857"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223058 for CVE-2024-26857",
          "url": "https://bugzilla.suse.com/1223058"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26857"
    },
    {
      "cve": "CVE-2024-26861",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26861"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwireguard: receive: annotate data-race around receiving_counter.counter\n\nSyzkaller with KCSAN identified a data-race issue when accessing\nkeypair-\u003ereceiving_counter.counter. Use READ_ONCE() and WRITE_ONCE()\nannotations to mark the data race as intentional.\n\n    BUG: KCSAN: data-race in wg_packet_decrypt_worker / wg_packet_rx_poll\n\n    write to 0xffff888107765888 of 8 bytes by interrupt on cpu 0:\n     counter_validate drivers/net/wireguard/receive.c:321 [inline]\n     wg_packet_rx_poll+0x3ac/0xf00 drivers/net/wireguard/receive.c:461\n     __napi_poll+0x60/0x3b0 net/core/dev.c:6536\n     napi_poll net/core/dev.c:6605 [inline]\n     net_rx_action+0x32b/0x750 net/core/dev.c:6738\n     __do_softirq+0xc4/0x279 kernel/softirq.c:553\n     do_softirq+0x5e/0x90 kernel/softirq.c:454\n     __local_bh_enable_ip+0x64/0x70 kernel/softirq.c:381\n     __raw_spin_unlock_bh include/linux/spinlock_api_smp.h:167 [inline]\n     _raw_spin_unlock_bh+0x36/0x40 kernel/locking/spinlock.c:210\n     spin_unlock_bh include/linux/spinlock.h:396 [inline]\n     ptr_ring_consume_bh include/linux/ptr_ring.h:367 [inline]\n     wg_packet_decrypt_worker+0x6c5/0x700 drivers/net/wireguard/receive.c:499\n     process_one_work kernel/workqueue.c:2633 [inline]\n     ...\n\n    read to 0xffff888107765888 of 8 bytes by task 3196 on cpu 1:\n     decrypt_packet drivers/net/wireguard/receive.c:252 [inline]\n     wg_packet_decrypt_worker+0x220/0x700 drivers/net/wireguard/receive.c:501\n     process_one_work kernel/workqueue.c:2633 [inline]\n     process_scheduled_works+0x5b8/0xa30 kernel/workqueue.c:2706\n     worker_thread+0x525/0x730 kernel/workqueue.c:2787\n     ...",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26861",
          "url": "https://www.suse.com/security/cve/CVE-2024-26861"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223076 for CVE-2024-26861",
          "url": "https://bugzilla.suse.com/1223076"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26861"
    },
    {
      "cve": "CVE-2024-26862",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26862"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\npacket: annotate data-races around ignore_outgoing\n\nignore_outgoing is read locklessly from dev_queue_xmit_nit()\nand packet_getsockopt()\n\nAdd appropriate READ_ONCE()/WRITE_ONCE() annotations.\n\nsyzbot reported:\n\nBUG: KCSAN: data-race in dev_queue_xmit_nit / packet_setsockopt\n\nwrite to 0xffff888107804542 of 1 bytes by task 22618 on cpu 0:\n packet_setsockopt+0xd83/0xfd0 net/packet/af_packet.c:4003\n do_sock_setsockopt net/socket.c:2311 [inline]\n __sys_setsockopt+0x1d8/0x250 net/socket.c:2334\n __do_sys_setsockopt net/socket.c:2343 [inline]\n __se_sys_setsockopt net/socket.c:2340 [inline]\n __x64_sys_setsockopt+0x66/0x80 net/socket.c:2340\n do_syscall_64+0xd3/0x1d0\n entry_SYSCALL_64_after_hwframe+0x6d/0x75\n\nread to 0xffff888107804542 of 1 bytes by task 27 on cpu 1:\n dev_queue_xmit_nit+0x82/0x620 net/core/dev.c:2248\n xmit_one net/core/dev.c:3527 [inline]\n dev_hard_start_xmit+0xcc/0x3f0 net/core/dev.c:3547\n __dev_queue_xmit+0xf24/0x1dd0 net/core/dev.c:4335\n dev_queue_xmit include/linux/netdevice.h:3091 [inline]\n batadv_send_skb_packet+0x264/0x300 net/batman-adv/send.c:108\n batadv_send_broadcast_skb+0x24/0x30 net/batman-adv/send.c:127\n batadv_iv_ogm_send_to_if net/batman-adv/bat_iv_ogm.c:392 [inline]\n batadv_iv_ogm_emit net/batman-adv/bat_iv_ogm.c:420 [inline]\n batadv_iv_send_outstanding_bat_ogm_packet+0x3f0/0x4b0 net/batman-adv/bat_iv_ogm.c:1700\n process_one_work kernel/workqueue.c:3254 [inline]\n process_scheduled_works+0x465/0x990 kernel/workqueue.c:3335\n worker_thread+0x526/0x730 kernel/workqueue.c:3416\n kthread+0x1d1/0x210 kernel/kthread.c:388\n ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:147\n ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:243\n\nvalue changed: 0x00 -\u003e 0x01\n\nReported by Kernel Concurrency Sanitizer on:\nCPU: 1 PID: 27 Comm: kworker/u8:1 Tainted: G        W          6.8.0-syzkaller-08073-g480e035fc4c7 #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/29/2024\nWorkqueue: bat_events batadv_iv_send_outstanding_bat_ogm_packet",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26862",
          "url": "https://www.suse.com/security/cve/CVE-2024-26862"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223111 for CVE-2024-26862",
          "url": "https://bugzilla.suse.com/1223111"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26862"
    },
    {
      "cve": "CVE-2024-26866",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26866"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nspi: lpspi: Avoid potential use-after-free in probe()\n\nfsl_lpspi_probe() is allocating/disposing memory manually with\nspi_alloc_host()/spi_alloc_target(), but uses\ndevm_spi_register_controller(). In case of error after the latter call the\nmemory will be explicitly freed in the probe function by\nspi_controller_put() call, but used afterwards by \"devm\" management outside\nprobe() (spi_unregister_controller() \u003c- devm_spi_unregister() below).\n\nUnable to handle kernel NULL pointer dereference at virtual address 0000000000000070\n...\nCall trace:\n kernfs_find_ns\n kernfs_find_and_get_ns\n sysfs_remove_group\n sysfs_remove_groups\n device_remove_attrs\n device_del\n spi_unregister_controller\n devm_spi_unregister\n release_nodes\n devres_release_all\n really_probe\n driver_probe_device\n __device_attach_driver\n bus_for_each_drv\n __device_attach\n device_initial_probe\n bus_probe_device\n deferred_probe_work_func\n process_one_work\n worker_thread\n kthread\n ret_from_fork",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26866",
          "url": "https://www.suse.com/security/cve/CVE-2024-26866"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223024 for CVE-2024-26866",
          "url": "https://bugzilla.suse.com/1223024"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26866"
    },
    {
      "cve": "CVE-2024-26872",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26872"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/srpt: Do not register event handler until srpt device is fully setup\n\nUpon rare occasions, KASAN reports a use-after-free Write\nin srpt_refresh_port().\n\nThis seems to be because an event handler is registered before the\nsrpt device is fully setup and a race condition upon error may leave a\npartially setup event handler in place.\n\nInstead, only register the event handler after srpt device initialization\nis complete.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26872",
          "url": "https://www.suse.com/security/cve/CVE-2024-26872"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223115 for CVE-2024-26872",
          "url": "https://bugzilla.suse.com/1223115"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26872"
    },
    {
      "cve": "CVE-2024-26875",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26875"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: pvrusb2: fix uaf in pvr2_context_set_notify\n\n[Syzbot reported]\nBUG: KASAN: slab-use-after-free in pvr2_context_set_notify+0x2c4/0x310 drivers/media/usb/pvrusb2/pvrusb2-context.c:35\nRead of size 4 at addr ffff888113aeb0d8 by task kworker/1:1/26\n\nCPU: 1 PID: 26 Comm: kworker/1:1 Not tainted 6.8.0-rc1-syzkaller-00046-gf1a27f081c1f #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024\nWorkqueue: usb_hub_wq hub_event\nCall Trace:\n \u003cTASK\u003e\n __dump_stack lib/dump_stack.c:88 [inline]\n dump_stack_lvl+0xd9/0x1b0 lib/dump_stack.c:106\n print_address_description mm/kasan/report.c:377 [inline]\n print_report+0xc4/0x620 mm/kasan/report.c:488\n kasan_report+0xda/0x110 mm/kasan/report.c:601\n pvr2_context_set_notify+0x2c4/0x310 drivers/media/usb/pvrusb2/pvrusb2-context.c:35\n pvr2_context_notify drivers/media/usb/pvrusb2/pvrusb2-context.c:95 [inline]\n pvr2_context_disconnect+0x94/0xb0 drivers/media/usb/pvrusb2/pvrusb2-context.c:272\n\nFreed by task 906:\nkasan_save_stack+0x33/0x50 mm/kasan/common.c:47\nkasan_save_track+0x14/0x30 mm/kasan/common.c:68\nkasan_save_free_info+0x3f/0x60 mm/kasan/generic.c:640\npoison_slab_object mm/kasan/common.c:241 [inline]\n__kasan_slab_free+0x106/0x1b0 mm/kasan/common.c:257\nkasan_slab_free include/linux/kasan.h:184 [inline]\nslab_free_hook mm/slub.c:2121 [inline]\nslab_free mm/slub.c:4299 [inline]\nkfree+0x105/0x340 mm/slub.c:4409\npvr2_context_check drivers/media/usb/pvrusb2/pvrusb2-context.c:137 [inline]\npvr2_context_thread_func+0x69d/0x960 drivers/media/usb/pvrusb2/pvrusb2-context.c:158\n\n[Analyze]\nTask A set disconnect_flag = !0, which resulted in Task B\u0027s condition being met\nand releasing mp, leading to this issue.\n\n[Fix]\nPlace the disconnect_flag assignment operation after all code in pvr2_context_disconnect()\nto avoid this issue.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26875",
          "url": "https://www.suse.com/security/cve/CVE-2024-26875"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223118 for CVE-2024-26875",
          "url": "https://bugzilla.suse.com/1223118"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26875"
    },
    {
      "cve": "CVE-2024-26878",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26878"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nquota: Fix potential NULL pointer dereference\n\nBelow race may cause NULL pointer dereference\n\nP1\t\t\t\t\tP2\ndquot_free_inode\t\t\tquota_off\n\t\t\t\t\t  drop_dquot_ref\n\t\t\t\t\t   remove_dquot_ref\n\t\t\t\t\t   dquots = i_dquot(inode)\n  dquots = i_dquot(inode)\n  srcu_read_lock\n  dquots[cnt]) != NULL (1)\n\t\t\t\t\t     dquots[type] = NULL (2)\n  spin_lock(\u0026dquots[cnt]-\u003edq_dqb_lock) (3)\n   ....\n\nIf dquot_free_inode(or other routines) checks inode\u0027s quota pointers (1)\nbefore quota_off sets it to NULL(2) and use it (3) after that, NULL pointer\ndereference will be triggered.\n\nSo let\u0027s fix it by using a temporary pointer to avoid this issue.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26878",
          "url": "https://www.suse.com/security/cve/CVE-2024-26878"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223060 for CVE-2024-26878",
          "url": "https://bugzilla.suse.com/1223060"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26878"
    },
    {
      "cve": "CVE-2024-26879",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26879"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nclk: meson: Add missing clocks to axg_clk_regmaps\n\nSome clocks were missing from axg_clk_regmaps, which caused kernel panic\nduring cat /sys/kernel/debug/clk/clk_summary\n\n[   57.349402] Unable to handle kernel NULL pointer dereference at virtual address 00000000000001fc\n...\n[   57.430002] pstate: 60000005 (nZCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)\n[   57.436900] pc : regmap_read+0x1c/0x88\n[   57.440608] lr : clk_regmap_gate_is_enabled+0x3c/0xb0\n[   57.445611] sp : ffff800082f1b690\n[   57.448888] x29: ffff800082f1b690 x28: 0000000000000000 x27: ffff800080eb9a70\n[   57.455961] x26: 0000000000000007 x25: 0000000000000016 x24: 0000000000000000\n[   57.463033] x23: ffff800080e8b488 x22: 0000000000000015 x21: ffff00000e7e7000\n[   57.470106] x20: ffff00000400ec00 x19: 0000000000000000 x18: ffffffffffffffff\n[   57.477178] x17: 0000000000000000 x16: 0000000000000000 x15: ffff0000042a3000\n[   57.484251] x14: 0000000000000000 x13: ffff0000042a2fec x12: 0000000005f5e100\n[   57.491323] x11: abcc77118461cefd x10: 0000000000000020 x9 : ffff8000805e4b24\n[   57.498396] x8 : ffff0000028063c0 x7 : ffff800082f1b710 x6 : ffff800082f1b710\n[   57.505468] x5 : 00000000ffffffd0 x4 : ffff800082f1b6e0 x3 : 0000000000001000\n[   57.512541] x2 : ffff800082f1b6e4 x1 : 000000000000012c x0 : 0000000000000000\n[   57.519615] Call trace:\n[   57.522030]  regmap_read+0x1c/0x88\n[   57.525393]  clk_regmap_gate_is_enabled+0x3c/0xb0\n[   57.530050]  clk_core_is_enabled+0x44/0x120\n[   57.534190]  clk_summary_show_subtree+0x154/0x2f0\n[   57.538847]  clk_summary_show_subtree+0x220/0x2f0\n[   57.543505]  clk_summary_show_subtree+0x220/0x2f0\n[   57.548162]  clk_summary_show_subtree+0x220/0x2f0\n[   57.552820]  clk_summary_show_subtree+0x220/0x2f0\n[   57.557477]  clk_summary_show_subtree+0x220/0x2f0\n[   57.562135]  clk_summary_show_subtree+0x220/0x2f0\n[   57.566792]  clk_summary_show_subtree+0x220/0x2f0\n[   57.571450]  clk_summary_show+0x84/0xb8\n[   57.575245]  seq_read_iter+0x1bc/0x4b8\n[   57.578954]  seq_read+0x8c/0xd0\n[   57.582059]  full_proxy_read+0x68/0xc8\n[   57.585767]  vfs_read+0xb0/0x268\n[   57.588959]  ksys_read+0x70/0x108\n[   57.592236]  __arm64_sys_read+0x24/0x38\n[   57.596031]  invoke_syscall+0x50/0x128\n[   57.599740]  el0_svc_common.constprop.0+0x48/0xf8\n[   57.604397]  do_el0_svc+0x28/0x40\n[   57.607675]  el0_svc+0x34/0xb8\n[   57.610694]  el0t_64_sync_handler+0x13c/0x158\n[   57.615006]  el0t_64_sync+0x190/0x198\n[   57.618635] Code: a9bd7bfd 910003fd a90153f3 aa0003f3 (b941fc00)\n[   57.624668] ---[ end trace 0000000000000000 ]---\n\n[jbrunet: add missing Fixes tag]",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26879",
          "url": "https://www.suse.com/security/cve/CVE-2024-26879"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223066 for CVE-2024-26879",
          "url": "https://bugzilla.suse.com/1223066"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26879"
    },
    {
      "cve": "CVE-2024-26881",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26881"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: hns3: fix kernel crash when 1588 is received on HIP08 devices\n\nThe HIP08 devices does not register the ptp devices, so the\nhdev-\u003eptp is NULL, but the hardware can receive 1588 messages,\nand set the HNS3_RXD_TS_VLD_B bit, so, if match this case, the\naccess of hdev-\u003eptp-\u003eflags will cause a kernel crash:\n\n[ 5888.946472] Unable to handle kernel NULL pointer dereference at virtual address 0000000000000018\n[ 5888.946475] Unable to handle kernel NULL pointer dereference at virtual address 0000000000000018\n...\n[ 5889.266118] pc : hclge_ptp_get_rx_hwts+0x40/0x170 [hclge]\n[ 5889.272612] lr : hclge_ptp_get_rx_hwts+0x34/0x170 [hclge]\n[ 5889.279101] sp : ffff800012c3bc50\n[ 5889.283516] x29: ffff800012c3bc50 x28: ffff2040002be040\n[ 5889.289927] x27: ffff800009116484 x26: 0000000080007500\n[ 5889.296333] x25: 0000000000000000 x24: ffff204001c6f000\n[ 5889.302738] x23: ffff204144f53c00 x22: 0000000000000000\n[ 5889.309134] x21: 0000000000000000 x20: ffff204004220080\n[ 5889.315520] x19: ffff204144f53c00 x18: 0000000000000000\n[ 5889.321897] x17: 0000000000000000 x16: 0000000000000000\n[ 5889.328263] x15: 0000004000140ec8 x14: 0000000000000000\n[ 5889.334617] x13: 0000000000000000 x12: 00000000010011df\n[ 5889.340965] x11: bbfeff4d22000000 x10: 0000000000000000\n[ 5889.347303] x9 : ffff800009402124 x8 : 0200f78811dfbb4d\n[ 5889.353637] x7 : 2200000000191b01 x6 : ffff208002a7d480\n[ 5889.359959] x5 : 0000000000000000 x4 : 0000000000000000\n[ 5889.366271] x3 : 0000000000000000 x2 : 0000000000000000\n[ 5889.372567] x1 : 0000000000000000 x0 : ffff20400095c080\n[ 5889.378857] Call trace:\n[ 5889.382285] hclge_ptp_get_rx_hwts+0x40/0x170 [hclge]\n[ 5889.388304] hns3_handle_bdinfo+0x324/0x410 [hns3]\n[ 5889.394055] hns3_handle_rx_bd+0x60/0x150 [hns3]\n[ 5889.399624] hns3_clean_rx_ring+0x84/0x170 [hns3]\n[ 5889.405270] hns3_nic_common_poll+0xa8/0x220 [hns3]\n[ 5889.411084] napi_poll+0xcc/0x264\n[ 5889.415329] net_rx_action+0xd4/0x21c\n[ 5889.419911] __do_softirq+0x130/0x358\n[ 5889.424484] irq_exit+0x134/0x154\n[ 5889.428700] __handle_domain_irq+0x88/0xf0\n[ 5889.433684] gic_handle_irq+0x78/0x2c0\n[ 5889.438319] el1_irq+0xb8/0x140\n[ 5889.442354] arch_cpu_idle+0x18/0x40\n[ 5889.446816] default_idle_call+0x5c/0x1c0\n[ 5889.451714] cpuidle_idle_call+0x174/0x1b0\n[ 5889.456692] do_idle+0xc8/0x160\n[ 5889.460717] cpu_startup_entry+0x30/0xfc\n[ 5889.465523] secondary_start_kernel+0x158/0x1ec\n[ 5889.470936] Code: 97ffab78 f9411c14 91408294 f9457284 (f9400c80)\n[ 5889.477950] SMP: stopping secondary CPUs\n[ 5890.514626] SMP: failed to stop secondary CPUs 0-69,71-95\n[ 5890.522951] Starting crashdump kernel...",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26881",
          "url": "https://www.suse.com/security/cve/CVE-2024-26881"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223041 for CVE-2024-26881",
          "url": "https://bugzilla.suse.com/1223041"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26881"
    },
    {
      "cve": "CVE-2024-26882",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26882"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: ip_tunnel: make sure to pull inner header in ip_tunnel_rcv()\n\nApply the same fix than ones found in :\n\n8d975c15c0cd (\"ip6_tunnel: make sure to pull inner header in __ip6_tnl_rcv()\")\n1ca1ba465e55 (\"geneve: make sure to pull inner header in geneve_rx()\")\n\nWe have to save skb-\u003enetwork_header in a temporary variable\nin order to be able to recompute the network_header pointer\nafter a pskb_inet_may_pull() call.\n\npskb_inet_may_pull() makes sure the needed headers are in skb-\u003ehead.\n\nsyzbot reported:\nBUG: KMSAN: uninit-value in __INET_ECN_decapsulate include/net/inet_ecn.h:253 [inline]\n BUG: KMSAN: uninit-value in INET_ECN_decapsulate include/net/inet_ecn.h:275 [inline]\n BUG: KMSAN: uninit-value in IP_ECN_decapsulate include/net/inet_ecn.h:302 [inline]\n BUG: KMSAN: uninit-value in ip_tunnel_rcv+0xed9/0x2ed0 net/ipv4/ip_tunnel.c:409\n  __INET_ECN_decapsulate include/net/inet_ecn.h:253 [inline]\n  INET_ECN_decapsulate include/net/inet_ecn.h:275 [inline]\n  IP_ECN_decapsulate include/net/inet_ecn.h:302 [inline]\n  ip_tunnel_rcv+0xed9/0x2ed0 net/ipv4/ip_tunnel.c:409\n  __ipgre_rcv+0x9bc/0xbc0 net/ipv4/ip_gre.c:389\n  ipgre_rcv net/ipv4/ip_gre.c:411 [inline]\n  gre_rcv+0x423/0x19f0 net/ipv4/ip_gre.c:447\n  gre_rcv+0x2a4/0x390 net/ipv4/gre_demux.c:163\n  ip_protocol_deliver_rcu+0x264/0x1300 net/ipv4/ip_input.c:205\n  ip_local_deliver_finish+0x2b8/0x440 net/ipv4/ip_input.c:233\n  NF_HOOK include/linux/netfilter.h:314 [inline]\n  ip_local_deliver+0x21f/0x490 net/ipv4/ip_input.c:254\n  dst_input include/net/dst.h:461 [inline]\n  ip_rcv_finish net/ipv4/ip_input.c:449 [inline]\n  NF_HOOK include/linux/netfilter.h:314 [inline]\n  ip_rcv+0x46f/0x760 net/ipv4/ip_input.c:569\n  __netif_receive_skb_one_core net/core/dev.c:5534 [inline]\n  __netif_receive_skb+0x1a6/0x5a0 net/core/dev.c:5648\n  netif_receive_skb_internal net/core/dev.c:5734 [inline]\n  netif_receive_skb+0x58/0x660 net/core/dev.c:5793\n  tun_rx_batched+0x3ee/0x980 drivers/net/tun.c:1556\n  tun_get_user+0x53b9/0x66e0 drivers/net/tun.c:2009\n  tun_chr_write_iter+0x3af/0x5d0 drivers/net/tun.c:2055\n  call_write_iter include/linux/fs.h:2087 [inline]\n  new_sync_write fs/read_write.c:497 [inline]\n  vfs_write+0xb6b/0x1520 fs/read_write.c:590\n  ksys_write+0x20f/0x4c0 fs/read_write.c:643\n  __do_sys_write fs/read_write.c:655 [inline]\n  __se_sys_write fs/read_write.c:652 [inline]\n  __x64_sys_write+0x93/0xd0 fs/read_write.c:652\n  do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n  do_syscall_64+0xcf/0x1e0 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x63/0x6b\n\nUninit was created at:\n  __alloc_pages+0x9a6/0xe00 mm/page_alloc.c:4590\n  alloc_pages_mpol+0x62b/0x9d0 mm/mempolicy.c:2133\n  alloc_pages+0x1be/0x1e0 mm/mempolicy.c:2204\n  skb_page_frag_refill+0x2bf/0x7c0 net/core/sock.c:2909\n  tun_build_skb drivers/net/tun.c:1686 [inline]\n  tun_get_user+0xe0a/0x66e0 drivers/net/tun.c:1826\n  tun_chr_write_iter+0x3af/0x5d0 drivers/net/tun.c:2055\n  call_write_iter include/linux/fs.h:2087 [inline]\n  new_sync_write fs/read_write.c:497 [inline]\n  vfs_write+0xb6b/0x1520 fs/read_write.c:590\n  ksys_write+0x20f/0x4c0 fs/read_write.c:643\n  __do_sys_write fs/read_write.c:655 [inline]\n  __se_sys_write fs/read_write.c:652 [inline]\n  __x64_sys_write+0x93/0xd0 fs/read_write.c:652\n  do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n  do_syscall_64+0xcf/0x1e0 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x63/0x6b",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26882",
          "url": "https://www.suse.com/security/cve/CVE-2024-26882"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223034 for CVE-2024-26882",
          "url": "https://bugzilla.suse.com/1223034"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26882"
    },
    {
      "cve": "CVE-2024-26883",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26883"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Fix stackmap overflow check on 32-bit arches\n\nThe stackmap code relies on roundup_pow_of_two() to compute the number\nof hash buckets, and contains an overflow check by checking if the\nresulting value is 0. However, on 32-bit arches, the roundup code itself\ncan overflow by doing a 32-bit left-shift of an unsigned long value,\nwhich is undefined behaviour, so it is not guaranteed to truncate\nneatly. This was triggered by syzbot on the DEVMAP_HASH type, which\ncontains the same check, copied from the hashtab code.\n\nThe commit in the fixes tag actually attempted to fix this, but the fix\ndid not account for the UB, so the fix only works on CPUs where an\noverflow does result in a neat truncation to zero, which is not\nguaranteed. Checking the value before rounding does not have this\nproblem.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26883",
          "url": "https://www.suse.com/security/cve/CVE-2024-26883"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223035 for CVE-2024-26883",
          "url": "https://bugzilla.suse.com/1223035"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26883"
    },
    {
      "cve": "CVE-2024-26884",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26884"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Fix hashtab overflow check on 32-bit arches\n\nThe hashtab code relies on roundup_pow_of_two() to compute the number of\nhash buckets, and contains an overflow check by checking if the\nresulting value is 0. However, on 32-bit arches, the roundup code itself\ncan overflow by doing a 32-bit left-shift of an unsigned long value,\nwhich is undefined behaviour, so it is not guaranteed to truncate\nneatly. This was triggered by syzbot on the DEVMAP_HASH type, which\ncontains the same check, copied from the hashtab code. So apply the same\nfix to hashtab, by moving the overflow check to before the roundup.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26884",
          "url": "https://www.suse.com/security/cve/CVE-2024-26884"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223189 for CVE-2024-26884",
          "url": "https://bugzilla.suse.com/1223189"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26884"
    },
    {
      "cve": "CVE-2024-26885",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26885"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Fix DEVMAP_HASH overflow check on 32-bit arches\n\nThe devmap code allocates a number hash buckets equal to the next power\nof two of the max_entries value provided when creating the map. When\nrounding up to the next power of two, the 32-bit variable storing the\nnumber of buckets can overflow, and the code checks for overflow by\nchecking if the truncated 32-bit value is equal to 0. However, on 32-bit\narches the rounding up itself can overflow mid-way through, because it\nends up doing a left-shift of 32 bits on an unsigned long value. If the\nsize of an unsigned long is four bytes, this is undefined behaviour, so\nthere is no guarantee that we\u0027ll end up with a nice and tidy 0-value at\nthe end.\n\nSyzbot managed to turn this into a crash on arm32 by creating a\nDEVMAP_HASH with max_entries \u003e 0x80000000 and then trying to update it.\nFix this by moving the overflow check to before the rounding up\noperation.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26885",
          "url": "https://www.suse.com/security/cve/CVE-2024-26885"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223190 for CVE-2024-26885",
          "url": "https://bugzilla.suse.com/1223190"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26885"
    },
    {
      "cve": "CVE-2024-26891",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26891"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\niommu/vt-d: Don\u0027t issue ATS Invalidation request when device is disconnected\n\nFor those endpoint devices connect to system via hotplug capable ports,\nusers could request a hot reset to the device by flapping device\u0027s link\nthrough setting the slot\u0027s link control register, as pciehp_ist() DLLSC\ninterrupt sequence response, pciehp will unload the device driver and\nthen power it off. thus cause an IOMMU device-TLB invalidation (Intel\nVT-d spec, or ATS Invalidation in PCIe spec r6.1) request for non-existence\ntarget device to be sent and deadly loop to retry that request after ITE\nfault triggered in interrupt context.\n\nThat would cause following continuous hard lockup warning and system hang\n\n[ 4211.433662] pcieport 0000:17:01.0: pciehp: Slot(108): Link Down\n[ 4211.433664] pcieport 0000:17:01.0: pciehp: Slot(108): Card not present\n[ 4223.822591] NMI watchdog: Watchdog detected hard LOCKUP on cpu 144\n[ 4223.822622] CPU: 144 PID: 1422 Comm: irq/57-pciehp Kdump: loaded Tainted: G S\n         OE    kernel version xxxx\n[ 4223.822623] Hardware name: vendorname xxxx 666-106,\nBIOS 01.01.02.03.01 05/15/2023\n[ 4223.822623] RIP: 0010:qi_submit_sync+0x2c0/0x490\n[ 4223.822624] Code: 48 be 00 00 00 00 00 08 00 00 49 85 74 24 20 0f 95 c1 48 8b\n 57 10 83 c1 04 83 3c 1a 03 0f 84 a2 01 00 00 49 8b 04 24 8b 70 34 \u003c40\u003e f6 c6 1\n0 74 17 49 8b 04 24 8b 80 80 00 00 00 89 c2 d3 fa 41 39\n[ 4223.822624] RSP: 0018:ffffc4f074f0bbb8 EFLAGS: 00000093\n[ 4223.822625] RAX: ffffc4f040059000 RBX: 0000000000000014 RCX: 0000000000000005\n[ 4223.822625] RDX: ffff9f3841315800 RSI: 0000000000000000 RDI: ffff9f38401a8340\n[ 4223.822625] RBP: ffff9f38401a8340 R08: ffffc4f074f0bc00 R09: 0000000000000000\n[ 4223.822626] R10: 0000000000000010 R11: 0000000000000018 R12: ffff9f384005e200\n[ 4223.822626] R13: 0000000000000004 R14: 0000000000000046 R15: 0000000000000004\n[ 4223.822626] FS:  0000000000000000(0000) GS:ffffa237ae400000(0000)\nknlGS:0000000000000000\n[ 4223.822627] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[ 4223.822627] CR2: 00007ffe86515d80 CR3: 000002fd3000a001 CR4: 0000000000770ee0\n[ 4223.822627] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n[ 4223.822628] DR3: 0000000000000000 DR6: 00000000fffe07f0 DR7: 0000000000000400\n[ 4223.822628] PKRU: 55555554\n[ 4223.822628] Call Trace:\n[ 4223.822628]  qi_flush_dev_iotlb+0xb1/0xd0\n[ 4223.822628]  __dmar_remove_one_dev_info+0x224/0x250\n[ 4223.822629]  dmar_remove_one_dev_info+0x3e/0x50\n[ 4223.822629]  intel_iommu_release_device+0x1f/0x30\n[ 4223.822629]  iommu_release_device+0x33/0x60\n[ 4223.822629]  iommu_bus_notifier+0x7f/0x90\n[ 4223.822630]  blocking_notifier_call_chain+0x60/0x90\n[ 4223.822630]  device_del+0x2e5/0x420\n[ 4223.822630]  pci_remove_bus_device+0x70/0x110\n[ 4223.822630]  pciehp_unconfigure_device+0x7c/0x130\n[ 4223.822631]  pciehp_disable_slot+0x6b/0x100\n[ 4223.822631]  pciehp_handle_presence_or_link_change+0xd8/0x320\n[ 4223.822631]  pciehp_ist+0x176/0x180\n[ 4223.822631]  ? irq_finalize_oneshot.part.50+0x110/0x110\n[ 4223.822632]  irq_thread_fn+0x19/0x50\n[ 4223.822632]  irq_thread+0x104/0x190\n[ 4223.822632]  ? irq_forced_thread_fn+0x90/0x90\n[ 4223.822632]  ? irq_thread_check_affinity+0xe0/0xe0\n[ 4223.822633]  kthread+0x114/0x130\n[ 4223.822633]  ? __kthread_cancel_work+0x40/0x40\n[ 4223.822633]  ret_from_fork+0x1f/0x30\n[ 4223.822633] Kernel panic - not syncing: Hard LOCKUP\n[ 4223.822634] CPU: 144 PID: 1422 Comm: irq/57-pciehp Kdump: loaded Tainted: G S\n         OE     kernel version xxxx\n[ 4223.822634] Hardware name: vendorname xxxx 666-106,\nBIOS 01.01.02.03.01 05/15/2023\n[ 4223.822634] Call Trace:\n[ 4223.822634]  \u003cNMI\u003e\n[ 4223.822635]  dump_stack+0x6d/0x88\n[ 4223.822635]  panic+0x101/0x2d0\n[ 4223.822635]  ? ret_from_fork+0x11/0x30\n[ 4223.822635]  nmi_panic.cold.14+0xc/0xc\n[ 4223.822636]  watchdog_overflow_callback.cold.8+0x6d/0x81\n[ 4223.822636]  __perf_event_overflow+0x4f/0xf0\n[ 4223.822636]  handle_pmi_common\n---truncated---",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26891",
          "url": "https://www.suse.com/security/cve/CVE-2024-26891"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223037 for CVE-2024-26891",
          "url": "https://bugzilla.suse.com/1223037"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26891"
    },
    {
      "cve": "CVE-2024-26893",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26893"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfirmware: arm_scmi: Fix double free in SMC transport cleanup path\n\nWhen the generic SCMI code tears down a channel, it calls the chan_free\ncallback function, defined by each transport. Since multiple protocols\nmight share the same transport_info member, chan_free() might want to\nclean up the same member multiple times within the given SCMI transport\nimplementation. In this case, it is SMC transport. This will lead to a NULL\npointer dereference at the second time:\n\n    | scmi_protocol scmi_dev.1: Enabled polling mode TX channel - prot_id:16\n    | arm-scmi firmware:scmi: SCMI Notifications - Core Enabled.\n    | arm-scmi firmware:scmi: unable to communicate with SCMI\n    | Unable to handle kernel NULL pointer dereference at virtual address 0000000000000000\n    | Mem abort info:\n    |   ESR = 0x0000000096000004\n    |   EC = 0x25: DABT (current EL), IL = 32 bits\n    |   SET = 0, FnV = 0\n    |   EA = 0, S1PTW = 0\n    |   FSC = 0x04: level 0 translation fault\n    | Data abort info:\n    |   ISV = 0, ISS = 0x00000004, ISS2 = 0x00000000\n    |   CM = 0, WnR = 0, TnD = 0, TagAccess = 0\n    |   GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0\n    | user pgtable: 4k pages, 48-bit VAs, pgdp=0000000881ef8000\n    | [0000000000000000] pgd=0000000000000000, p4d=0000000000000000\n    | Internal error: Oops: 0000000096000004 [#1] PREEMPT SMP\n    | Modules linked in:\n    | CPU: 4 PID: 1 Comm: swapper/0 Not tainted 6.7.0-rc2-00124-g455ef3d016c9-dirty #793\n    | Hardware name: FVP Base RevC (DT)\n    | pstate: 61400009 (nZCv daif +PAN -UAO -TCO +DIT -SSBS BTYPE=--)\n    | pc : smc_chan_free+0x3c/0x6c\n    | lr : smc_chan_free+0x3c/0x6c\n    | Call trace:\n    |  smc_chan_free+0x3c/0x6c\n    |  idr_for_each+0x68/0xf8\n    |  scmi_cleanup_channels.isra.0+0x2c/0x58\n    |  scmi_probe+0x434/0x734\n    |  platform_probe+0x68/0xd8\n    |  really_probe+0x110/0x27c\n    |  __driver_probe_device+0x78/0x12c\n    |  driver_probe_device+0x3c/0x118\n    |  __driver_attach+0x74/0x128\n    |  bus_for_each_dev+0x78/0xe0\n    |  driver_attach+0x24/0x30\n    |  bus_add_driver+0xe4/0x1e8\n    |  driver_register+0x60/0x128\n    |  __platform_driver_register+0x28/0x34\n    |  scmi_driver_init+0x84/0xc0\n    |  do_one_initcall+0x78/0x33c\n    |  kernel_init_freeable+0x2b8/0x51c\n    |  kernel_init+0x24/0x130\n    |  ret_from_fork+0x10/0x20\n    | Code: f0004701 910a0021 aa1403e5 97b91c70 (b9400280)\n    | ---[ end trace 0000000000000000 ]---\n\nSimply check for the struct pointer being NULL before trying to access\nits members, to avoid this situation.\n\nThis was found when a transport doesn\u0027t really work (for instance no SMC\nservice), the probe routines then tries to clean up, and triggers a crash.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26893",
          "url": "https://www.suse.com/security/cve/CVE-2024-26893"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223196 for CVE-2024-26893",
          "url": "https://bugzilla.suse.com/1223196"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26893"
    },
    {
      "cve": "CVE-2024-26895",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26895"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: wilc1000: prevent use-after-free on vif when cleaning up all interfaces\n\nwilc_netdev_cleanup currently triggers a KASAN warning, which can be\nobserved on interface registration error path, or simply by\nremoving the module/unbinding device from driver:\n\necho spi0.1 \u003e /sys/bus/spi/drivers/wilc1000_spi/unbind\n\n==================================================================\nBUG: KASAN: slab-use-after-free in wilc_netdev_cleanup+0x508/0x5cc\nRead of size 4 at addr c54d1ce8 by task sh/86\n\nCPU: 0 PID: 86 Comm: sh Not tainted 6.8.0-rc1+ #117\nHardware name: Atmel SAMA5\n unwind_backtrace from show_stack+0x18/0x1c\n show_stack from dump_stack_lvl+0x34/0x58\n dump_stack_lvl from print_report+0x154/0x500\n print_report from kasan_report+0xac/0xd8\n kasan_report from wilc_netdev_cleanup+0x508/0x5cc\n wilc_netdev_cleanup from wilc_bus_remove+0xc8/0xec\n wilc_bus_remove from spi_remove+0x8c/0xac\n spi_remove from device_release_driver_internal+0x434/0x5f8\n device_release_driver_internal from unbind_store+0xbc/0x108\n unbind_store from kernfs_fop_write_iter+0x398/0x584\n kernfs_fop_write_iter from vfs_write+0x728/0xf88\n vfs_write from ksys_write+0x110/0x1e4\n ksys_write from ret_fast_syscall+0x0/0x1c\n\n[...]\n\nAllocated by task 1:\n kasan_save_track+0x30/0x5c\n __kasan_kmalloc+0x8c/0x94\n __kmalloc_node+0x1cc/0x3e4\n kvmalloc_node+0x48/0x180\n alloc_netdev_mqs+0x68/0x11dc\n alloc_etherdev_mqs+0x28/0x34\n wilc_netdev_ifc_init+0x34/0x8ec\n wilc_cfg80211_init+0x690/0x910\n wilc_bus_probe+0xe0/0x4a0\n spi_probe+0x158/0x1b0\n really_probe+0x270/0xdf4\n __driver_probe_device+0x1dc/0x580\n driver_probe_device+0x60/0x140\n __driver_attach+0x228/0x5d4\n bus_for_each_dev+0x13c/0x1a8\n bus_add_driver+0x2a0/0x608\n driver_register+0x24c/0x578\n do_one_initcall+0x180/0x310\n kernel_init_freeable+0x424/0x484\n kernel_init+0x20/0x148\n ret_from_fork+0x14/0x28\n\nFreed by task 86:\n kasan_save_track+0x30/0x5c\n kasan_save_free_info+0x38/0x58\n __kasan_slab_free+0xe4/0x140\n kfree+0xb0/0x238\n device_release+0xc0/0x2a8\n kobject_put+0x1d4/0x46c\n netdev_run_todo+0x8fc/0x11d0\n wilc_netdev_cleanup+0x1e4/0x5cc\n wilc_bus_remove+0xc8/0xec\n spi_remove+0x8c/0xac\n device_release_driver_internal+0x434/0x5f8\n unbind_store+0xbc/0x108\n kernfs_fop_write_iter+0x398/0x584\n vfs_write+0x728/0xf88\n ksys_write+0x110/0x1e4\n ret_fast_syscall+0x0/0x1c\n [...]\n\nDavid Mosberger-Tan initial investigation [1] showed that this\nuse-after-free is due to netdevice unregistration during vif list\ntraversal. When unregistering a net device, since the needs_free_netdev has\nbeen set to true during registration, the netdevice object is also freed,\nand as a consequence, the corresponding vif object too, since it is\nattached to it as private netdevice data. The next occurrence of the loop\nthen tries to access freed vif pointer to the list to move forward in the\nlist.\n\nFix this use-after-free thanks to two mechanisms:\n- navigate in the list with list_for_each_entry_safe, which allows to\n  safely modify the list as we go through each element. For each element,\n  remove it from the list with list_del_rcu\n- make sure to wait for RCU grace period end after each vif removal to make\n  sure it is safe to free the corresponding vif too (through\n  unregister_netdev)\n\nSince we are in a RCU \"modifier\" path (not a \"reader\" path), and because\nsuch path is expected not to be concurrent to any other modifier (we are\nusing the vif_mutex lock), we do not need to use RCU list API, that\u0027s why\nwe can benefit from list_for_each_entry_safe.\n\n[1] https://lore.kernel.org/linux-wireless/ab077dbe58b1ea5de0a3b2ca21f275a07af967d2.camel@egauge.net/",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26895",
          "url": "https://www.suse.com/security/cve/CVE-2024-26895"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223197 for CVE-2024-26895",
          "url": "https://bugzilla.suse.com/1223197"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26895"
    },
    {
      "cve": "CVE-2024-26896",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26896"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: wfx: fix memory leak when starting AP\n\nKmemleak reported this error:\n\n    unreferenced object 0xd73d1180 (size 184):\n      comm \"wpa_supplicant\", pid 1559, jiffies 13006305 (age 964.245s)\n      hex dump (first 32 bytes):\n        00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................\n        00 00 00 00 00 00 00 00 1e 00 01 00 00 00 00 00  ................\n      backtrace:\n        [\u003c5ca11420\u003e] kmem_cache_alloc+0x20c/0x5ac\n        [\u003c127bdd74\u003e] __alloc_skb+0x144/0x170\n        [\u003cfb8a5e38\u003e] __netdev_alloc_skb+0x50/0x180\n        [\u003c0f9fa1d5\u003e] __ieee80211_beacon_get+0x290/0x4d4 [mac80211]\n        [\u003c7accd02d\u003e] ieee80211_beacon_get_tim+0x54/0x18c [mac80211]\n        [\u003c41e25cc3\u003e] wfx_start_ap+0xc8/0x234 [wfx]\n        [\u003c93a70356\u003e] ieee80211_start_ap+0x404/0x6b4 [mac80211]\n        [\u003ca4a661cd\u003e] nl80211_start_ap+0x76c/0x9e0 [cfg80211]\n        [\u003c47bd8b68\u003e] genl_rcv_msg+0x198/0x378\n        [\u003c453ef796\u003e] netlink_rcv_skb+0xd0/0x130\n        [\u003c6b7c977a\u003e] genl_rcv+0x34/0x44\n        [\u003c66b2d04d\u003e] netlink_unicast+0x1b4/0x258\n        [\u003cf965b9b6\u003e] netlink_sendmsg+0x1e8/0x428\n        [\u003caadb8231\u003e] ____sys_sendmsg+0x1e0/0x274\n        [\u003cd2b5212d\u003e] ___sys_sendmsg+0x80/0xb4\n        [\u003c69954f45\u003e] __sys_sendmsg+0x64/0xa8\n    unreferenced object 0xce087000 (size 1024):\n      comm \"wpa_supplicant\", pid 1559, jiffies 13006305 (age 964.246s)\n      hex dump (first 32 bytes):\n        00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................\n        10 00 07 40 00 00 00 00 00 00 00 00 00 00 00 00  ...@............\n      backtrace:\n        [\u003c9a993714\u003e] __kmalloc_track_caller+0x230/0x600\n        [\u003cf83ea192\u003e] kmalloc_reserve.constprop.0+0x30/0x74\n        [\u003ca2c61343\u003e] __alloc_skb+0xa0/0x170\n        [\u003cfb8a5e38\u003e] __netdev_alloc_skb+0x50/0x180\n        [\u003c0f9fa1d5\u003e] __ieee80211_beacon_get+0x290/0x4d4 [mac80211]\n        [\u003c7accd02d\u003e] ieee80211_beacon_get_tim+0x54/0x18c [mac80211]\n        [\u003c41e25cc3\u003e] wfx_start_ap+0xc8/0x234 [wfx]\n        [\u003c93a70356\u003e] ieee80211_start_ap+0x404/0x6b4 [mac80211]\n        [\u003ca4a661cd\u003e] nl80211_start_ap+0x76c/0x9e0 [cfg80211]\n        [\u003c47bd8b68\u003e] genl_rcv_msg+0x198/0x378\n        [\u003c453ef796\u003e] netlink_rcv_skb+0xd0/0x130\n        [\u003c6b7c977a\u003e] genl_rcv+0x34/0x44\n        [\u003c66b2d04d\u003e] netlink_unicast+0x1b4/0x258\n        [\u003cf965b9b6\u003e] netlink_sendmsg+0x1e8/0x428\n        [\u003caadb8231\u003e] ____sys_sendmsg+0x1e0/0x274\n        [\u003cd2b5212d\u003e] ___sys_sendmsg+0x80/0xb4\n\nHowever, since the kernel is build optimized, it seems the stack is not\naccurate. It appears the issue is related to wfx_set_mfp_ap(). The issue\nis obvious in this function: memory allocated by ieee80211_beacon_get()\nis never released. Fixing this leak makes kmemleak happy.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26896",
          "url": "https://www.suse.com/security/cve/CVE-2024-26896"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223042 for CVE-2024-26896",
          "url": "https://bugzilla.suse.com/1223042"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26896"
    },
    {
      "cve": "CVE-2024-26897",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26897"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: ath9k: delay all of ath9k_wmi_event_tasklet() until init is complete\n\nThe ath9k_wmi_event_tasklet() used in ath9k_htc assumes that all the data\nstructures have been fully initialised by the time it runs. However, because of\nthe order in which things are initialised, this is not guaranteed to be the\ncase, because the device is exposed to the USB subsystem before the ath9k driver\ninitialisation is completed.\n\nWe already committed a partial fix for this in commit:\n8b3046abc99e (\"ath9k_htc: fix NULL pointer dereference at ath9k_htc_tx_get_packet()\")\n\nHowever, that commit only aborted the WMI_TXSTATUS_EVENTID command in the event\ntasklet, pairing it with an \"initialisation complete\" bit in the TX struct. It\nseems syzbot managed to trigger the race for one of the other commands as well,\nso let\u0027s just move the existing synchronisation bit to cover the whole\ntasklet (setting it at the end of ath9k_htc_probe_device() instead of inside\nath9k_tx_init()).",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26897",
          "url": "https://www.suse.com/security/cve/CVE-2024-26897"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223323 for CVE-2024-26897",
          "url": "https://bugzilla.suse.com/1223323"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26897"
    },
    {
      "cve": "CVE-2024-26898",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26898"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\naoe: fix the potential use-after-free problem in aoecmd_cfg_pkts\n\nThis patch is against CVE-2023-6270. The description of cve is:\n\n  A flaw was found in the ATA over Ethernet (AoE) driver in the Linux\n  kernel. The aoecmd_cfg_pkts() function improperly updates the refcnt on\n  `struct net_device`, and a use-after-free can be triggered by racing\n  between the free on the struct and the access through the `skbtxq`\n  global queue. This could lead to a denial of service condition or\n  potential code execution.\n\nIn aoecmd_cfg_pkts(), it always calls dev_put(ifp) when skb initial\ncode is finished. But the net_device ifp will still be used in\nlater tx()-\u003edev_queue_xmit() in kthread. Which means that the\ndev_put(ifp) should NOT be called in the success path of skb\ninitial code in aoecmd_cfg_pkts(). Otherwise tx() may run into\nuse-after-free because the net_device is freed.\n\nThis patch removed the dev_put(ifp) in the success path in\naoecmd_cfg_pkts(), and added dev_put() after skb xmit in tx().",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26898",
          "url": "https://www.suse.com/security/cve/CVE-2024-26898"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1218562 for CVE-2024-26898",
          "url": "https://bugzilla.suse.com/1218562"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223016 for CVE-2024-26898",
          "url": "https://bugzilla.suse.com/1223016"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223017 for CVE-2024-26898",
          "url": "https://bugzilla.suse.com/1223017"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26898"
    },
    {
      "cve": "CVE-2024-26901",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26901"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndo_sys_name_to_handle(): use kzalloc() to fix kernel-infoleak\n\nsyzbot identified a kernel information leak vulnerability in\ndo_sys_name_to_handle() and issued the following report [1].\n\n[1]\n\"BUG: KMSAN: kernel-infoleak in instrument_copy_to_user include/linux/instrumented.h:114 [inline]\nBUG: KMSAN: kernel-infoleak in _copy_to_user+0xbc/0x100 lib/usercopy.c:40\n instrument_copy_to_user include/linux/instrumented.h:114 [inline]\n _copy_to_user+0xbc/0x100 lib/usercopy.c:40\n copy_to_user include/linux/uaccess.h:191 [inline]\n do_sys_name_to_handle fs/fhandle.c:73 [inline]\n __do_sys_name_to_handle_at fs/fhandle.c:112 [inline]\n __se_sys_name_to_handle_at+0x949/0xb10 fs/fhandle.c:94\n __x64_sys_name_to_handle_at+0xe4/0x140 fs/fhandle.c:94\n ...\n\nUninit was created at:\n slab_post_alloc_hook+0x129/0xa70 mm/slab.h:768\n slab_alloc_node mm/slub.c:3478 [inline]\n __kmem_cache_alloc_node+0x5c9/0x970 mm/slub.c:3517\n __do_kmalloc_node mm/slab_common.c:1006 [inline]\n __kmalloc+0x121/0x3c0 mm/slab_common.c:1020\n kmalloc include/linux/slab.h:604 [inline]\n do_sys_name_to_handle fs/fhandle.c:39 [inline]\n __do_sys_name_to_handle_at fs/fhandle.c:112 [inline]\n __se_sys_name_to_handle_at+0x441/0xb10 fs/fhandle.c:94\n __x64_sys_name_to_handle_at+0xe4/0x140 fs/fhandle.c:94\n ...\n\nBytes 18-19 of 20 are uninitialized\nMemory access of size 20 starts at ffff888128a46380\nData copied to user address 0000000020000240\"\n\nPer Chuck Lever\u0027s suggestion, use kzalloc() instead of kmalloc() to\nsolve the problem.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26901",
          "url": "https://www.suse.com/security/cve/CVE-2024-26901"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223198 for CVE-2024-26901",
          "url": "https://bugzilla.suse.com/1223198"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "low"
        }
      ],
      "title": "CVE-2024-26901"
    },
    {
      "cve": "CVE-2024-26903",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26903"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: rfcomm: Fix null-ptr-deref in rfcomm_check_security\n\nDuring our fuzz testing of the connection and disconnection process at the\nRFCOMM layer, we discovered this bug. By comparing the packets from a\nnormal connection and disconnection process with the testcase that\ntriggered a KASAN report. We analyzed the cause of this bug as follows:\n\n1. In the packets captured during a normal connection, the host sends a\n`Read Encryption Key Size` type of `HCI_CMD` packet\n(Command Opcode: 0x1408) to the controller to inquire the length of\nencryption key.After receiving this packet, the controller immediately\nreplies with a Command Completepacket (Event Code: 0x0e) to return the\nEncryption Key Size.\n\n2. In our fuzz test case, the timing of the controller\u0027s response to this\npacket was delayed to an unexpected point: after the RFCOMM and L2CAP\nlayers had disconnected but before the HCI layer had disconnected.\n\n3. After receiving the Encryption Key Size Response at the time described\nin point 2, the host still called the rfcomm_check_security function.\nHowever, by this time `struct l2cap_conn *conn = l2cap_pi(sk)-\u003echan-\u003econn;`\nhad already been released, and when the function executed\n`return hci_conn_security(conn-\u003ehcon, d-\u003esec_level, auth_type, d-\u003eout);`,\nspecifically when accessing `conn-\u003ehcon`, a null-ptr-deref error occurred.\n\nTo fix this bug, check if `sk-\u003esk_state` is BT_CLOSED before calling\nrfcomm_recv_frame in rfcomm_process_rx.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26903",
          "url": "https://www.suse.com/security/cve/CVE-2024-26903"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223187 for CVE-2024-26903",
          "url": "https://bugzilla.suse.com/1223187"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26903"
    },
    {
      "cve": "CVE-2024-26917",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26917"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: Revert \"scsi: fcoe: Fix potential deadlock on \u0026fip-\u003ectlr_lock\"\n\nThis reverts commit 1a1975551943f681772720f639ff42fbaa746212.\n\nThis commit causes interrupts to be lost for FCoE devices, since it changed\nsping locks from \"bh\" to \"irqsave\".\n\nInstead, a work queue should be used, and will be addressed in a separate\ncommit.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26917",
          "url": "https://www.suse.com/security/cve/CVE-2024-26917"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223056 for CVE-2024-26917",
          "url": "https://bugzilla.suse.com/1223056"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26917"
    },
    {
      "cve": "CVE-2024-26927",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26927"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nASoC: SOF: Add some bounds checking to firmware data\n\nSmatch complains about \"head-\u003efull_size - head-\u003eheader_size\" can\nunderflow.  To some extent, we\u0027re always going to have to trust the\nfirmware a bit.  However, it\u0027s easy enough to add a check for negatives,\nand let\u0027s add a upper bounds check as well.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26927",
          "url": "https://www.suse.com/security/cve/CVE-2024-26927"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223525 for CVE-2024-26927",
          "url": "https://bugzilla.suse.com/1223525"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26927"
    },
    {
      "cve": "CVE-2024-26948",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26948"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/display: Add a dc_state NULL check in dc_state_release\n\n[How]\nCheck wheather state is NULL before releasing it.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26948",
          "url": "https://www.suse.com/security/cve/CVE-2024-26948"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223664 for CVE-2024-26948",
          "url": "https://bugzilla.suse.com/1223664"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26948"
    },
    {
      "cve": "CVE-2024-26950",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26950"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwireguard: netlink: access device through ctx instead of peer\n\nThe previous commit fixed a bug that led to a NULL peer-\u003edevice being\ndereferenced. It\u0027s actually easier and faster performance-wise to\ninstead get the device from ctx-\u003ewg. This semantically makes more sense\ntoo, since ctx-\u003ewg-\u003epeer_allowedips.seq is compared with\nctx-\u003eallowedips_seq, basing them both in ctx. This also acts as a\ndefence in depth provision against freed peers.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26950",
          "url": "https://www.suse.com/security/cve/CVE-2024-26950"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223661 for CVE-2024-26950",
          "url": "https://bugzilla.suse.com/1223661"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26950"
    },
    {
      "cve": "CVE-2024-26951",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26951"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwireguard: netlink: check for dangling peer via is_dead instead of empty list\n\nIf all peers are removed via wg_peer_remove_all(), rather than setting\npeer_list to empty, the peer is added to a temporary list with a head on\nthe stack of wg_peer_remove_all(). If a netlink dump is resumed and the\ncursored peer is one that has been removed via wg_peer_remove_all(), it\nwill iterate from that peer and then attempt to dump freed peers.\n\nFix this by instead checking peer-\u003eis_dead, which was explictly created\nfor this purpose. Also move up the device_update_lock lockdep assertion,\nsince reading is_dead relies on that.\n\nIt can be reproduced by a small script like:\n\n    echo \"Setting config...\"\n    ip link add dev wg0 type wireguard\n    wg setconf wg0 /big-config\n    (\n            while true; do\n                    echo \"Showing config...\"\n                    wg showconf wg0 \u003e /dev/null\n            done\n    ) \u0026\n    sleep 4\n    wg setconf wg0 \u003c(printf \"[Peer]\\nPublicKey=$(wg genkey)\\n\")\n\nResulting in:\n\n    BUG: KASAN: slab-use-after-free in __lock_acquire+0x182a/0x1b20\n    Read of size 8 at addr ffff88811956ec70 by task wg/59\n    CPU: 2 PID: 59 Comm: wg Not tainted 6.8.0-rc2-debug+ #5\n    Call Trace:\n     \u003cTASK\u003e\n     dump_stack_lvl+0x47/0x70\n     print_address_description.constprop.0+0x2c/0x380\n     print_report+0xab/0x250\n     kasan_report+0xba/0xf0\n     __lock_acquire+0x182a/0x1b20\n     lock_acquire+0x191/0x4b0\n     down_read+0x80/0x440\n     get_peer+0x140/0xcb0\n     wg_get_device_dump+0x471/0x1130",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26951",
          "url": "https://www.suse.com/security/cve/CVE-2024-26951"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223660 for CVE-2024-26951",
          "url": "https://bugzilla.suse.com/1223660"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26951"
    },
    {
      "cve": "CVE-2024-26955",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26955"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnilfs2: prevent kernel bug at submit_bh_wbc()\n\nFix a bug where nilfs_get_block() returns a successful status when\nsearching and inserting the specified block both fail inconsistently.  If\nthis inconsistent behavior is not due to a previously fixed bug, then an\nunexpected race is occurring, so return a temporary error -EAGAIN instead.\n\nThis prevents callers such as __block_write_begin_int() from requesting a\nread into a buffer that is not mapped, which would cause the BUG_ON check\nfor the BH_Mapped flag in submit_bh_wbc() to fail.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26955",
          "url": "https://www.suse.com/security/cve/CVE-2024-26955"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223657 for CVE-2024-26955",
          "url": "https://bugzilla.suse.com/1223657"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26955"
    },
    {
      "cve": "CVE-2024-26956",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26956"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnilfs2: fix failure to detect DAT corruption in btree and direct mappings\n\nPatch series \"nilfs2: fix kernel bug at submit_bh_wbc()\".\n\nThis resolves a kernel BUG reported by syzbot.  Since there are two\nflaws involved, I\u0027ve made each one a separate patch.\n\nThe first patch alone resolves the syzbot-reported bug, but I think\nboth fixes should be sent to stable, so I\u0027ve tagged them as such.\n\n\nThis patch (of 2):\n\nSyzbot has reported a kernel bug in submit_bh_wbc() when writing file data\nto a nilfs2 file system whose metadata is corrupted.\n\nThere are two flaws involved in this issue.\n\nThe first flaw is that when nilfs_get_block() locates a data block using\nbtree or direct mapping, if the disk address translation routine\nnilfs_dat_translate() fails with internal code -ENOENT due to DAT metadata\ncorruption, it can be passed back to nilfs_get_block().  This causes\nnilfs_get_block() to misidentify an existing block as non-existent,\ncausing both data block lookup and insertion to fail inconsistently.\n\nThe second flaw is that nilfs_get_block() returns a successful status in\nthis inconsistent state.  This causes the caller __block_write_begin_int()\nor others to request a read even though the buffer is not mapped,\nresulting in a BUG_ON check for the BH_Mapped flag in submit_bh_wbc()\nfailing.\n\nThis fixes the first issue by changing the return value to code -EINVAL\nwhen a conversion using DAT fails with code -ENOENT, avoiding the\nconflicting condition that leads to the kernel bug described above.  Here,\ncode -EINVAL indicates that metadata corruption was detected during the\nblock lookup, which will be properly handled as a file system error and\nconverted to -EIO when passing through the nilfs2 bmap layer.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26956",
          "url": "https://www.suse.com/security/cve/CVE-2024-26956"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223663 for CVE-2024-26956",
          "url": "https://bugzilla.suse.com/1223663"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26956"
    },
    {
      "cve": "CVE-2024-26960",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26960"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm: swap: fix race between free_swap_and_cache() and swapoff()\n\nThere was previously a theoretical window where swapoff() could run and\nteardown a swap_info_struct while a call to free_swap_and_cache() was\nrunning in another thread.  This could cause, amongst other bad\npossibilities, swap_page_trans_huge_swapped() (called by\nfree_swap_and_cache()) to access the freed memory for swap_map.\n\nThis is a theoretical problem and I haven\u0027t been able to provoke it from a\ntest case.  But there has been agreement based on code review that this is\npossible (see link below).\n\nFix it by using get_swap_device()/put_swap_device(), which will stall\nswapoff().  There was an extra check in _swap_info_get() to confirm that\nthe swap entry was not free.  This isn\u0027t present in get_swap_device()\nbecause it doesn\u0027t make sense in general due to the race between getting\nthe reference and swapoff.  So I\u0027ve added an equivalent check directly in\nfree_swap_and_cache().\n\nDetails of how to provoke one possible issue (thanks to David Hildenbrand\nfor deriving this):\n\n--8\u003c-----\n\n__swap_entry_free() might be the last user and result in\n\"count == SWAP_HAS_CACHE\".\n\nswapoff-\u003etry_to_unuse() will stop as soon as soon as si-\u003einuse_pages==0.\n\nSo the question is: could someone reclaim the folio and turn\nsi-\u003einuse_pages==0, before we completed swap_page_trans_huge_swapped().\n\nImagine the following: 2 MiB folio in the swapcache. Only 2 subpages are\nstill references by swap entries.\n\nProcess 1 still references subpage 0 via swap entry.\nProcess 2 still references subpage 1 via swap entry.\n\nProcess 1 quits. Calls free_swap_and_cache().\n-\u003e count == SWAP_HAS_CACHE\n[then, preempted in the hypervisor etc.]\n\nProcess 2 quits. Calls free_swap_and_cache().\n-\u003e count == SWAP_HAS_CACHE\n\nProcess 2 goes ahead, passes swap_page_trans_huge_swapped(), and calls\n__try_to_reclaim_swap().\n\n__try_to_reclaim_swap()-\u003efolio_free_swap()-\u003edelete_from_swap_cache()-\u003e\nput_swap_folio()-\u003efree_swap_slot()-\u003eswapcache_free_entries()-\u003e\nswap_entry_free()-\u003eswap_range_free()-\u003e\n...\nWRITE_ONCE(si-\u003einuse_pages, si-\u003einuse_pages - nr_entries);\n\nWhat stops swapoff to succeed after process 2 reclaimed the swap cache\nbut before process1 finished its call to swap_page_trans_huge_swapped()?\n\n--8\u003c-----",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26960",
          "url": "https://www.suse.com/security/cve/CVE-2024-26960"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223655 for CVE-2024-26960",
          "url": "https://bugzilla.suse.com/1223655"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26960"
    },
    {
      "cve": "CVE-2024-26965",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26965"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nclk: qcom: mmcc-msm8974: fix terminating of frequency table arrays\n\nThe frequency table arrays are supposed to be terminated with an\nempty element. Add such entry to the end of the arrays where it\nis missing in order to avoid possible out-of-bound access when\nthe table is traversed by functions like qcom_find_freq() or\nqcom_find_freq_floor().\n\nOnly compile tested.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26965",
          "url": "https://www.suse.com/security/cve/CVE-2024-26965"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223648 for CVE-2024-26965",
          "url": "https://bugzilla.suse.com/1223648"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26965"
    },
    {
      "cve": "CVE-2024-26966",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26966"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nclk: qcom: mmcc-apq8084: fix terminating of frequency table arrays\n\nThe frequency table arrays are supposed to be terminated with an\nempty element. Add such entry to the end of the arrays where it\nis missing in order to avoid possible out-of-bound access when\nthe table is traversed by functions like qcom_find_freq() or\nqcom_find_freq_floor().\n\nOnly compile tested.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26966",
          "url": "https://www.suse.com/security/cve/CVE-2024-26966"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223646 for CVE-2024-26966",
          "url": "https://bugzilla.suse.com/1223646"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26966"
    },
    {
      "cve": "CVE-2024-26969",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26969"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nclk: qcom: gcc-ipq8074: fix terminating of frequency table arrays\n\nThe frequency table arrays are supposed to be terminated with an\nempty element. Add such entry to the end of the arrays where it\nis missing in order to avoid possible out-of-bound access when\nthe table is traversed by functions like qcom_find_freq() or\nqcom_find_freq_floor().\n\nOnly compile tested.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26969",
          "url": "https://www.suse.com/security/cve/CVE-2024-26969"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223645 for CVE-2024-26969",
          "url": "https://bugzilla.suse.com/1223645"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26969"
    },
    {
      "cve": "CVE-2024-26970",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26970"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nclk: qcom: gcc-ipq6018: fix terminating of frequency table arrays\n\nThe frequency table arrays are supposed to be terminated with an\nempty element. Add such entry to the end of the arrays where it\nis missing in order to avoid possible out-of-bound access when\nthe table is traversed by functions like qcom_find_freq() or\nqcom_find_freq_floor().\n\nOnly compile tested.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26970",
          "url": "https://www.suse.com/security/cve/CVE-2024-26970"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223644 for CVE-2024-26970",
          "url": "https://bugzilla.suse.com/1223644"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26970"
    },
    {
      "cve": "CVE-2024-26972",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26972"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26972",
          "url": "https://www.suse.com/security/cve/CVE-2024-26972"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223643 for CVE-2024-26972",
          "url": "https://bugzilla.suse.com/1223643"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26972"
    },
    {
      "cve": "CVE-2024-26981",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26981"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnilfs2: fix OOB in nilfs_set_de_type\n\nThe size of the nilfs_type_by_mode array in the fs/nilfs2/dir.c file is\ndefined as \"S_IFMT \u003e\u003e S_SHIFT\", but the nilfs_set_de_type() function,\nwhich uses this array, specifies the index to read from the array in the\nsame way as \"(mode \u0026 S_IFMT) \u003e\u003e S_SHIFT\".\n\nstatic void nilfs_set_de_type(struct nilfs_dir_entry *de, struct inode\n *inode)\n{\n\tumode_t mode = inode-\u003ei_mode;\n\n\tde-\u003efile_type = nilfs_type_by_mode[(mode \u0026 S_IFMT)\u003e\u003eS_SHIFT]; // oob\n}\n\nHowever, when the index is determined this way, an out-of-bounds (OOB)\nerror occurs by referring to an index that is 1 larger than the array size\nwhen the condition \"mode \u0026 S_IFMT == S_IFMT\" is satisfied.  Therefore, a\npatch to resize the nilfs_type_by_mode array should be applied to prevent\nOOB errors.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26981",
          "url": "https://www.suse.com/security/cve/CVE-2024-26981"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223668 for CVE-2024-26981",
          "url": "https://bugzilla.suse.com/1223668"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26981"
    },
    {
      "cve": "CVE-2024-26982",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26982"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nSquashfs: check the inode number is not the invalid value of zero\n\nSyskiller has produced an out of bounds access in fill_meta_index().\n\nThat out of bounds access is ultimately caused because the inode\nhas an inode number with the invalid value of zero, which was not checked.\n\nThe reason this causes the out of bounds access is due to following\nsequence of events:\n\n1. Fill_meta_index() is called to allocate (via empty_meta_index())\n   and fill a metadata index.  It however suffers a data read error\n   and aborts, invalidating the newly returned empty metadata index.\n   It does this by setting the inode number of the index to zero,\n   which means unused (zero is not a valid inode number).\n\n2. When fill_meta_index() is subsequently called again on another\n   read operation, locate_meta_index() returns the previous index\n   because it matches the inode number of 0.  Because this index\n   has been returned it is expected to have been filled, and because\n   it hasn\u0027t been, an out of bounds access is performed.\n\nThis patch adds a sanity check which checks that the inode number\nis not zero when the inode is created and returns -EINVAL if it is.\n\n[phillip@squashfs.org.uk: whitespace fix]\n  Link: https://lkml.kernel.org/r/20240409204723.446925-1-phillip@squashfs.org.uk",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26982",
          "url": "https://www.suse.com/security/cve/CVE-2024-26982"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223634 for CVE-2024-26982",
          "url": "https://bugzilla.suse.com/1223634"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26982"
    },
    {
      "cve": "CVE-2024-26993",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26993"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfs: sysfs: Fix reference leak in sysfs_break_active_protection()\n\nThe sysfs_break_active_protection() routine has an obvious reference\nleak in its error path.  If the call to kernfs_find_and_get() fails then\nkn will be NULL, so the companion sysfs_unbreak_active_protection()\nroutine won\u0027t get called (and would only cause an access violation by\ntrying to dereference kn-\u003eparent if it was called).  As a result, the\nreference to kobj acquired at the start of the function will never be\nreleased.\n\nFix the leak by adding an explicit kobject_put() call when kn is NULL.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26993",
          "url": "https://www.suse.com/security/cve/CVE-2024-26993"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223693 for CVE-2024-26993",
          "url": "https://bugzilla.suse.com/1223693"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26993"
    },
    {
      "cve": "CVE-2024-27013",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-27013"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntun: limit printing rate when illegal packet received by tun dev\n\nvhost_worker will call tun call backs to receive packets. If too many\nillegal packets arrives, tun_do_read will keep dumping packet contents.\nWhen console is enabled, it will costs much more cpu time to dump\npacket and soft lockup will be detected.\n\nnet_ratelimit mechanism can be used to limit the dumping rate.\n\nPID: 33036    TASK: ffff949da6f20000  CPU: 23   COMMAND: \"vhost-32980\"\n #0 [fffffe00003fce50] crash_nmi_callback at ffffffff89249253\n #1 [fffffe00003fce58] nmi_handle at ffffffff89225fa3\n #2 [fffffe00003fceb0] default_do_nmi at ffffffff8922642e\n #3 [fffffe00003fced0] do_nmi at ffffffff8922660d\n #4 [fffffe00003fcef0] end_repeat_nmi at ffffffff89c01663\n    [exception RIP: io_serial_in+20]\n    RIP: ffffffff89792594  RSP: ffffa655314979e8  RFLAGS: 00000002\n    RAX: ffffffff89792500  RBX: ffffffff8af428a0  RCX: 0000000000000000\n    RDX: 00000000000003fd  RSI: 0000000000000005  RDI: ffffffff8af428a0\n    RBP: 0000000000002710   R8: 0000000000000004   R9: 000000000000000f\n    R10: 0000000000000000  R11: ffffffff8acbf64f  R12: 0000000000000020\n    R13: ffffffff8acbf698  R14: 0000000000000058  R15: 0000000000000000\n    ORIG_RAX: ffffffffffffffff  CS: 0010  SS: 0018\n #5 [ffffa655314979e8] io_serial_in at ffffffff89792594\n #6 [ffffa655314979e8] wait_for_xmitr at ffffffff89793470\n #7 [ffffa65531497a08] serial8250_console_putchar at ffffffff897934f6\n #8 [ffffa65531497a20] uart_console_write at ffffffff8978b605\n #9 [ffffa65531497a48] serial8250_console_write at ffffffff89796558\n #10 [ffffa65531497ac8] console_unlock at ffffffff89316124\n #11 [ffffa65531497b10] vprintk_emit at ffffffff89317c07\n #12 [ffffa65531497b68] printk at ffffffff89318306\n #13 [ffffa65531497bc8] print_hex_dump at ffffffff89650765\n #14 [ffffa65531497ca8] tun_do_read at ffffffffc0b06c27 [tun]\n #15 [ffffa65531497d38] tun_recvmsg at ffffffffc0b06e34 [tun]\n #16 [ffffa65531497d68] handle_rx at ffffffffc0c5d682 [vhost_net]\n #17 [ffffa65531497ed0] vhost_worker at ffffffffc0c644dc [vhost]\n #18 [ffffa65531497f10] kthread at ffffffff892d2e72\n #19 [ffffa65531497f50] ret_from_fork at ffffffff89c0022f",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-27013",
          "url": "https://www.suse.com/security/cve/CVE-2024-27013"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223745 for CVE-2024-27013",
          "url": "https://bugzilla.suse.com/1223745"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-27013"
    },
    {
      "cve": "CVE-2024-27014",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-27014"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/mlx5e: Prevent deadlock while disabling aRFS\n\nWhen disabling aRFS under the `priv-\u003estate_lock`, any scheduled\naRFS works are canceled using the `cancel_work_sync` function,\nwhich waits for the work to end if it has already started.\nHowever, while waiting for the work handler, the handler will\ntry to acquire the `state_lock` which is already acquired.\n\nThe worker acquires the lock to delete the rules if the state\nis down, which is not the worker\u0027s responsibility since\ndisabling aRFS deletes the rules.\n\nAdd an aRFS state variable, which indicates whether the aRFS is\nenabled and prevent adding rules when the aRFS is disabled.\n\nKernel log:\n\n======================================================\nWARNING: possible circular locking dependency detected\n6.7.0-rc4_net_next_mlx5_5483eb2 #1 Tainted: G          I\n------------------------------------------------------\nethtool/386089 is trying to acquire lock:\nffff88810f21ce68 ((work_completion)(\u0026rule-\u003earfs_work)){+.+.}-{0:0}, at: __flush_work+0x74/0x4e0\n\nbut task is already holding lock:\nffff8884a1808cc0 (\u0026priv-\u003estate_lock){+.+.}-{3:3}, at: mlx5e_ethtool_set_channels+0x53/0x200 [mlx5_core]\n\nwhich lock already depends on the new lock.\n\nthe existing dependency chain (in reverse order) is:\n\n-\u003e #1 (\u0026priv-\u003estate_lock){+.+.}-{3:3}:\n       __mutex_lock+0x80/0xc90\n       arfs_handle_work+0x4b/0x3b0 [mlx5_core]\n       process_one_work+0x1dc/0x4a0\n       worker_thread+0x1bf/0x3c0\n       kthread+0xd7/0x100\n       ret_from_fork+0x2d/0x50\n       ret_from_fork_asm+0x11/0x20\n\n-\u003e #0 ((work_completion)(\u0026rule-\u003earfs_work)){+.+.}-{0:0}:\n       __lock_acquire+0x17b4/0x2c80\n       lock_acquire+0xd0/0x2b0\n       __flush_work+0x7a/0x4e0\n       __cancel_work_timer+0x131/0x1c0\n       arfs_del_rules+0x143/0x1e0 [mlx5_core]\n       mlx5e_arfs_disable+0x1b/0x30 [mlx5_core]\n       mlx5e_ethtool_set_channels+0xcb/0x200 [mlx5_core]\n       ethnl_set_channels+0x28f/0x3b0\n       ethnl_default_set_doit+0xec/0x240\n       genl_family_rcv_msg_doit+0xd0/0x120\n       genl_rcv_msg+0x188/0x2c0\n       netlink_rcv_skb+0x54/0x100\n       genl_rcv+0x24/0x40\n       netlink_unicast+0x1a1/0x270\n       netlink_sendmsg+0x214/0x460\n       __sock_sendmsg+0x38/0x60\n       __sys_sendto+0x113/0x170\n       __x64_sys_sendto+0x20/0x30\n       do_syscall_64+0x40/0xe0\n       entry_SYSCALL_64_after_hwframe+0x46/0x4e\n\nother info that might help us debug this:\n\n Possible unsafe locking scenario:\n\n       CPU0                    CPU1\n       ----                    ----\n  lock(\u0026priv-\u003estate_lock);\n                               lock((work_completion)(\u0026rule-\u003earfs_work));\n                               lock(\u0026priv-\u003estate_lock);\n  lock((work_completion)(\u0026rule-\u003earfs_work));\n\n *** DEADLOCK ***\n\n3 locks held by ethtool/386089:\n #0: ffffffff82ea7210 (cb_lock){++++}-{3:3}, at: genl_rcv+0x15/0x40\n #1: ffffffff82e94c88 (rtnl_mutex){+.+.}-{3:3}, at: ethnl_default_set_doit+0xd3/0x240\n #2: ffff8884a1808cc0 (\u0026priv-\u003estate_lock){+.+.}-{3:3}, at: mlx5e_ethtool_set_channels+0x53/0x200 [mlx5_core]\n\nstack backtrace:\nCPU: 15 PID: 386089 Comm: ethtool Tainted: G          I        6.7.0-rc4_net_next_mlx5_5483eb2 #1\nHardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014\nCall Trace:\n \u003cTASK\u003e\n dump_stack_lvl+0x60/0xa0\n check_noncircular+0x144/0x160\n __lock_acquire+0x17b4/0x2c80\n lock_acquire+0xd0/0x2b0\n ? __flush_work+0x74/0x4e0\n ? save_trace+0x3e/0x360\n ? __flush_work+0x74/0x4e0\n __flush_work+0x7a/0x4e0\n ? __flush_work+0x74/0x4e0\n ? __lock_acquire+0xa78/0x2c80\n ? lock_acquire+0xd0/0x2b0\n ? mark_held_locks+0x49/0x70\n __cancel_work_timer+0x131/0x1c0\n ? mark_held_locks+0x49/0x70\n arfs_del_rules+0x143/0x1e0 [mlx5_core]\n mlx5e_arfs_disable+0x1b/0x30 [mlx5_core]\n mlx5e_ethtool_set_channels+0xcb/0x200 [mlx5_core]\n ethnl_set_channels+0x28f/0x3b0\n ethnl_default_set_doit+0xec/0x240\n genl_family_rcv_msg_doit+0xd0/0x120\n genl_rcv_msg+0x188/0x2c0\n ? ethn\n---truncated---",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-27014",
          "url": "https://www.suse.com/security/cve/CVE-2024-27014"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223735 for CVE-2024-27014",
          "url": "https://bugzilla.suse.com/1223735"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-27014"
    },
    {
      "cve": "CVE-2024-27030",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-27030"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nocteontx2-af: Use separate handlers for interrupts\n\nFor PF to AF interrupt vector and VF to AF vector same\ninterrupt handler is registered which is causing race condition.\nWhen two interrupts are raised to two CPUs at same time\nthen two cores serve same event corrupting the data.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-27030",
          "url": "https://www.suse.com/security/cve/CVE-2024-27030"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223790 for CVE-2024-27030",
          "url": "https://bugzilla.suse.com/1223790"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-27030"
    },
    {
      "cve": "CVE-2024-27038",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-27038"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nclk: Fix clk_core_get NULL dereference\n\nIt is possible for clk_core_get to dereference a NULL in the following\nsequence:\n\nclk_core_get()\n    of_clk_get_hw_from_clkspec()\n        __of_clk_get_hw_from_provider()\n            __clk_get_hw()\n\n__clk_get_hw() can return NULL which is dereferenced by clk_core_get() at\nhw-\u003ecore.\n\nPrior to commit dde4eff47c82 (\"clk: Look for parents with clkdev based\nclk_lookups\") the check IS_ERR_OR_NULL() was performed which would have\ncaught the NULL.\n\nReading the description of this function it talks about returning NULL but\nthat cannot be so at the moment.\n\nUpdate the function to check for hw before dereferencing it and return NULL\nif hw is NULL.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-27038",
          "url": "https://www.suse.com/security/cve/CVE-2024-27038"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223816 for CVE-2024-27038",
          "url": "https://bugzilla.suse.com/1223816"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-27038"
    },
    {
      "cve": "CVE-2024-27039",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-27039"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nclk: hisilicon: hi3559a: Fix an erroneous devm_kfree()\n\n\u0027p_clk\u0027 is an array allocated just before the for loop for all clk that\nneed to be registered.\nIt is incremented at each loop iteration.\n\nIf a clk_register() call fails, \u0027p_clk\u0027 may point to something different\nfrom what should be freed.\n\nThe best we can do, is to avoid this wrong release of memory.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-27039",
          "url": "https://www.suse.com/security/cve/CVE-2024-27039"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223821 for CVE-2024-27039",
          "url": "https://bugzilla.suse.com/1223821"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-27039"
    },
    {
      "cve": "CVE-2024-27041",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-27041"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/display: fix NULL checks for adev-\u003edm.dc in amdgpu_dm_fini()\n\nSince \u0027adev-\u003edm.dc\u0027 in amdgpu_dm_fini() might turn out to be NULL\nbefore the call to dc_enable_dmub_notifications(), check\nbeforehand to ensure there will not be a possible NULL-ptr-deref\nthere.\n\nAlso, since commit 1e88eb1b2c25 (\"drm/amd/display: Drop\nCONFIG_DRM_AMD_DC_HDCP\") there are two separate checks for NULL in\n\u0027adev-\u003edm.dc\u0027 before dc_deinit_callbacks() and dc_dmub_srv_destroy().\nClean up by combining them all under one \u0027if\u0027.\n\nFound by Linux Verification Center (linuxtesting.org) with static\nanalysis tool SVACE.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-27041",
          "url": "https://www.suse.com/security/cve/CVE-2024-27041"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223714 for CVE-2024-27041",
          "url": "https://bugzilla.suse.com/1223714"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-27041"
    },
    {
      "cve": "CVE-2024-27043",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-27043"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: edia: dvbdev: fix a use-after-free\n\nIn dvb_register_device, *pdvbdev is set equal to dvbdev, which is freed\nin several error-handling paths. However, *pdvbdev is not set to NULL\nafter dvbdev\u0027s deallocation, causing use-after-frees in many places,\nfor example, in the following call chain:\n\nbudget_register\n  |-\u003e dvb_dmxdev_init\n        |-\u003e dvb_register_device\n  |-\u003e dvb_dmxdev_release\n        |-\u003e dvb_unregister_device\n              |-\u003e dvb_remove_device\n                    |-\u003e dvb_device_put\n                          |-\u003e kref_put\n\nWhen calling dvb_unregister_device, dmxdev-\u003edvbdev (i.e. *pdvbdev in\ndvb_register_device) could point to memory that had been freed in\ndvb_register_device. Thereafter, this pointer is transferred to\nkref_put and triggering a use-after-free.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-27043",
          "url": "https://www.suse.com/security/cve/CVE-2024-27043"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1218562 for CVE-2024-27043",
          "url": "https://bugzilla.suse.com/1218562"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223824 for CVE-2024-27043",
          "url": "https://bugzilla.suse.com/1223824"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223825 for CVE-2024-27043",
          "url": "https://bugzilla.suse.com/1223825"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "important"
        }
      ],
      "title": "CVE-2024-27043"
    },
    {
      "cve": "CVE-2024-27046",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-27046"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnfp: flower: handle acti_netdevs allocation failure\n\nThe kmalloc_array() in nfp_fl_lag_do_work() will return null, if\nthe physical memory has run out. As a result, if we dereference\nthe acti_netdevs, the null pointer dereference bugs will happen.\n\nThis patch adds a check to judge whether allocation failure occurs.\nIf it happens, the delayed work will be rescheduled and try again.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-27046",
          "url": "https://www.suse.com/security/cve/CVE-2024-27046"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223827 for CVE-2024-27046",
          "url": "https://bugzilla.suse.com/1223827"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-27046"
    },
    {
      "cve": "CVE-2024-27056",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-27056"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: iwlwifi: mvm: ensure offloading TID queue exists\n\nThe resume code path assumes that the TX queue for the offloading TID\nhas been configured. At resume time it then tries to sync the write\npointer as it may have been updated by the firmware.\n\nIn the unusual event that no packets have been send on TID 0, the queue\nwill not have been allocated and this causes a crash. Fix this by\nensuring the queue exist at suspend time.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-27056",
          "url": "https://www.suse.com/security/cve/CVE-2024-27056"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223822 for CVE-2024-27056",
          "url": "https://bugzilla.suse.com/1223822"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-27056"
    },
    {
      "cve": "CVE-2024-27062",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-27062"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnouveau: lock the client object tree.\n\nIt appears the client object tree has no locking unless I\u0027ve missed\nsomething else. Fix races around adding/removing client objects,\nmostly vram bar mappings.\n\n 4562.099306] general protection fault, probably for non-canonical address 0x6677ed422bceb80c: 0000 [#1] PREEMPT SMP PTI\n[ 4562.099314] CPU: 2 PID: 23171 Comm: deqp-vk Not tainted 6.8.0-rc6+ #27\n[ 4562.099324] Hardware name: Gigabyte Technology Co., Ltd. Z390 I AORUS PRO WIFI/Z390 I AORUS PRO WIFI-CF, BIOS F8 11/05/2021\n[ 4562.099330] RIP: 0010:nvkm_object_search+0x1d/0x70 [nouveau]\n[ 4562.099503] Code: 90 90 90 90 90 90 90 90 90 90 90 90 90 66 0f 1f 00 0f 1f 44 00 00 48 89 f8 48 85 f6 74 39 48 8b 87 a0 00 00 00 48 85 c0 74 12 \u003c48\u003e 8b 48 f8 48 39 ce 73 15 48 8b 40 10 48 85 c0 75 ee 48 c7 c0 fe\n[ 4562.099506] RSP: 0000:ffffa94cc420bbf8 EFLAGS: 00010206\n[ 4562.099512] RAX: 6677ed422bceb814 RBX: ffff98108791f400 RCX: ffff9810f26b8f58\n[ 4562.099517] RDX: 0000000000000000 RSI: ffff9810f26b9158 RDI: ffff98108791f400\n[ 4562.099519] RBP: ffff9810f26b9158 R08: 0000000000000000 R09: 0000000000000000\n[ 4562.099521] R10: ffffa94cc420bc48 R11: 0000000000000001 R12: ffff9810f02a7cc0\n[ 4562.099526] R13: 0000000000000000 R14: 00000000000000ff R15: 0000000000000007\n[ 4562.099528] FS:  00007f629c5017c0(0000) GS:ffff98142c700000(0000) knlGS:0000000000000000\n[ 4562.099534] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[ 4562.099536] CR2: 00007f629a882000 CR3: 000000017019e004 CR4: 00000000003706f0\n[ 4562.099541] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n[ 4562.099542] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\n[ 4562.099544] Call Trace:\n[ 4562.099555]  \u003cTASK\u003e\n[ 4562.099573]  ? die_addr+0x36/0x90\n[ 4562.099583]  ? exc_general_protection+0x246/0x4a0\n[ 4562.099593]  ? asm_exc_general_protection+0x26/0x30\n[ 4562.099600]  ? nvkm_object_search+0x1d/0x70 [nouveau]\n[ 4562.099730]  nvkm_ioctl+0xa1/0x250 [nouveau]\n[ 4562.099861]  nvif_object_map_handle+0xc8/0x180 [nouveau]\n[ 4562.099986]  nouveau_ttm_io_mem_reserve+0x122/0x270 [nouveau]\n[ 4562.100156]  ? dma_resv_test_signaled+0x26/0xb0\n[ 4562.100163]  ttm_bo_vm_fault_reserved+0x97/0x3c0 [ttm]\n[ 4562.100182]  ? __mutex_unlock_slowpath+0x2a/0x270\n[ 4562.100189]  nouveau_ttm_fault+0x69/0xb0 [nouveau]\n[ 4562.100356]  __do_fault+0x32/0x150\n[ 4562.100362]  do_fault+0x7c/0x560\n[ 4562.100369]  __handle_mm_fault+0x800/0xc10\n[ 4562.100382]  handle_mm_fault+0x17c/0x3e0\n[ 4562.100388]  do_user_addr_fault+0x208/0x860\n[ 4562.100395]  exc_page_fault+0x7f/0x200\n[ 4562.100402]  asm_exc_page_fault+0x26/0x30\n[ 4562.100412] RIP: 0033:0x9b9870\n[ 4562.100419] Code: 85 a8 f7 ff ff 8b 8d 80 f7 ff ff 89 08 e9 18 f2 ff ff 0f 1f 84 00 00 00 00 00 44 89 32 e9 90 fa ff ff 0f 1f 84 00 00 00 00 00 \u003c44\u003e 89 32 e9 f8 f1 ff ff 0f 1f 84 00 00 00 00 00 66 44 89 32 e9 e7\n[ 4562.100422] RSP: 002b:00007fff9ba2dc70 EFLAGS: 00010246\n[ 4562.100426] RAX: 0000000000000004 RBX: 000000000dd65e10 RCX: 000000fff0000000\n[ 4562.100428] RDX: 00007f629a882000 RSI: 00007f629a882000 RDI: 0000000000000066\n[ 4562.100432] RBP: 00007fff9ba2e570 R08: 0000000000000000 R09: 0000000123ddf000\n[ 4562.100434] R10: 0000000000000001 R11: 0000000000000246 R12: 000000007fffffff\n[ 4562.100436] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000\n[ 4562.100446]  \u003c/TASK\u003e\n[ 4562.100448] Modules linked in: nf_conntrack_netbios_ns nf_conntrack_broadcast nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib nft_reject_inet nf_reject_ipv4 nf_reject_ipv6 nft_reject nft_ct nft_chain_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 ip_set nf_tables libcrc32c nfnetlink cmac bnep sunrpc iwlmvm intel_rapl_msr intel_rapl_common snd_sof_pci_intel_cnl x86_pkg_temp_thermal intel_powerclamp snd_sof_intel_hda_common mac80211 coretemp snd_soc_acpi_intel_match kvm_intel snd_soc_acpi snd_soc_hdac_hda snd_sof_pci snd_sof_xtensa_dsp snd_sof_intel_hda_mlink \n---truncated---",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-27062",
          "url": "https://www.suse.com/security/cve/CVE-2024-27062"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223834 for CVE-2024-27062",
          "url": "https://bugzilla.suse.com/1223834"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-27062"
    },
    {
      "cve": "CVE-2024-27389",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-27389"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\npstore: inode: Only d_invalidate() is needed\n\nUnloading a modular pstore backend with records in pstorefs would\ntrigger the dput() double-drop warning:\n\n  WARNING: CPU: 0 PID: 2569 at fs/dcache.c:762 dput.part.0+0x3f3/0x410\n\nUsing the combo of d_drop()/dput() (as mentioned in\nDocumentation/filesystems/vfs.rst) isn\u0027t the right approach here, and\nleads to the reference counting problem seen above. Use d_invalidate()\nand update the code to not bother checking for error codes that can\nnever happen.\n\n---",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-27389",
          "url": "https://www.suse.com/security/cve/CVE-2024-27389"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223705 for CVE-2024-27389",
          "url": "https://bugzilla.suse.com/1223705"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.52.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.52.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T19:08:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-27389"
    }
  ]
}
  suse-su-2024:1647-1
Vulnerability from csaf_suse
Published
2024-05-14 14:30
    Modified
2024-05-14 14:30
    Summary
Security update for the Linux Kernel
    Notes
Title of the patch
Security update for the Linux Kernel
    Description of the patch
The SUSE Linux Enterprise 15 SP4 RT kernel was updated to receive various security bugfixes.
The following security bugs were fixed:
- CVE-2024-27389: Fixed pstore inode handling with d_invalidate() (bsc#1223705).
- CVE-2024-27043: Fixed a use-after-free in edia/dvbdev in different places (bsc#1223824).
- CVE-2024-23307: Fixed Integer Overflow or Wraparound vulnerability in x86 and ARM md, raid, raid5 modules (bsc#1219169).
- CVE-2024-23848: Fixed media/cec for possible use-after-free in cec_queue_msg_fh (bsc#1219104).
- CVE-2022-48662: Fixed a general protection fault (GPF) in i915_perf_open_ioctl (bsc#1223505).
- CVE-2022-48651: Fixed an out-of-bound bug in ipvlan caused by unset skb->mac_header (bsc#1223513).
- CVE-2023-52616: Fixed unexpected pointer access in crypto/lib/mpi in mpi_ec_init (bsc#1221612).
- CVE-2024-26816: Fixed relocations in .notes section when building with CONFIG_XEN_PV=y by ignoring them (bsc#1222624).
- CVE-2021-47207: Fixed a null pointer dereference on pointer block in gus (bsc#1222790).
- CVE-2024-26610: Fixed memory corruption in wifi/iwlwifi (bsc#1221299).
- CVE-2024-26687: Fixed xen/events close evtchn after mapping cleanup (bsc#1222435).
- CVE-2024-26601: Fixed ext4 buddy bitmap corruption via fast commit replay (bsc#1220342).
- CVE-2024-26764: Fixed IOCB_AIO_RW check in fs/aio before the struct aio_kiocb conversion (bsc#1222721).
- CVE-2024-26773: Fixed ext4 block allocation from corrupted group in ext4_mb_try_best_found() (bsc#1222618).
- CVE-2024-26766: Fixed SDMA off-by-one error in _pad_sdma_tx_descs() (bsc#1222726).
- CVE-2024-26689: Fixed a use-after-free in encode_cap_msg() (bsc#1222503).
- CVE-2024-26704: Fixed a double-free of blocks due to wrong extents moved_len in ext4 (bsc#1222422).
- CVE-2023-52500: Fixed information leaking when processing OPC_INB_SET_CONTROLLER_CONFIG command (bsc#1220883).
- CVE-2023-0160: Fixed deadlock flaw in BPF that could allow a local user to potentially crash the system (bsc#1209657).
- CVE-2024-26642: Fixed the set of anonymous timeout flag in netfilter nf_tables (bsc#1221830).
- CVE-2023-7192: Fixed a memory leak problem in ctnetlink_create_conntrack in net/netfilter/nf_conntrack_netlink.c (bsc#1218479).
- CVE-2024-26614: Fixed the initialization of accept_queue's spinlocks (bsc#1221293).
- CVE-2023-52607: Fixed NULL pointer dereference in pgtable_cache_add kasprintf() (bsc#1221061).
- CVE-2023-7042: Fixed a null-pointer-dereference in ath10k_wmi_tlv_op_pull_mgmt_tx_compl_ev() (bsc#1218336).
- CVE-2023-52476: Fixed possible unhandled page fault via perf sampling NMI during vsyscall (bsc#1220703).
The following non-security bugs were fixed:
- Call flush_delayed_fput() from nfsd main-loop (bsc#1223380).
- ibmvfc: make 'max_sectors' a module option (bsc#1216223).
- scsi: Update max_hw_sectors on rescan (bsc#1216223).
    Patchnames
SUSE-2024-1647,SUSE-SLE-Micro-5.3-2024-1647,SUSE-SLE-Micro-5.4-2024-1647,openSUSE-Leap-Micro-5.3-2024-1647,openSUSE-Leap-Micro-5.4-2024-1647
    Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
    {
  "document": {
    "aggregate_severity": {
      "namespace": "https://www.suse.com/support/security/rating/",
      "text": "important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright 2024 SUSE LLC. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Security update for the Linux Kernel",
        "title": "Title of the patch"
      },
      {
        "category": "description",
        "text": "The SUSE Linux Enterprise 15 SP4 RT kernel was updated to receive various security bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2024-27389: Fixed pstore inode handling with d_invalidate() (bsc#1223705).\n- CVE-2024-27043: Fixed a use-after-free in edia/dvbdev in different places (bsc#1223824).\n- CVE-2024-23307: Fixed Integer Overflow or Wraparound vulnerability in x86 and ARM md, raid, raid5 modules (bsc#1219169).\n- CVE-2024-23848: Fixed media/cec for possible use-after-free in cec_queue_msg_fh (bsc#1219104).\n- CVE-2022-48662: Fixed a general protection fault (GPF) in i915_perf_open_ioctl (bsc#1223505).\n- CVE-2022-48651: Fixed an out-of-bound bug in ipvlan caused by unset skb-\u003emac_header (bsc#1223513).\n- CVE-2023-52616: Fixed unexpected pointer access in crypto/lib/mpi in mpi_ec_init (bsc#1221612).\n- CVE-2024-26816: Fixed relocations in .notes section when building with CONFIG_XEN_PV=y by ignoring them (bsc#1222624).\n- CVE-2021-47207: Fixed a null pointer dereference on pointer block in gus (bsc#1222790).\n- CVE-2024-26610: Fixed memory corruption in wifi/iwlwifi (bsc#1221299).\n- CVE-2024-26687: Fixed xen/events close evtchn after mapping cleanup (bsc#1222435).\n- CVE-2024-26601: Fixed ext4 buddy bitmap corruption via fast commit replay (bsc#1220342).\n- CVE-2024-26764: Fixed IOCB_AIO_RW check in fs/aio before the struct aio_kiocb conversion (bsc#1222721).\n- CVE-2024-26773: Fixed ext4 block allocation from corrupted group in ext4_mb_try_best_found() (bsc#1222618).\n- CVE-2024-26766: Fixed SDMA off-by-one error in _pad_sdma_tx_descs() (bsc#1222726).\n- CVE-2024-26689: Fixed a use-after-free in encode_cap_msg() (bsc#1222503).\n- CVE-2024-26704: Fixed a double-free of blocks due to wrong extents moved_len in ext4 (bsc#1222422).\n- CVE-2023-52500: Fixed information leaking when processing OPC_INB_SET_CONTROLLER_CONFIG command (bsc#1220883).\n- CVE-2023-0160: Fixed deadlock flaw in BPF that could allow a local user to potentially crash the system (bsc#1209657).\n- CVE-2024-26642: Fixed the set of anonymous timeout flag in netfilter nf_tables (bsc#1221830).\n- CVE-2023-7192: Fixed a memory leak problem in ctnetlink_create_conntrack in net/netfilter/nf_conntrack_netlink.c (bsc#1218479).\n- CVE-2024-26614: Fixed the initialization of accept_queue\u0027s spinlocks (bsc#1221293).\n- CVE-2023-52607: Fixed NULL pointer dereference in pgtable_cache_add kasprintf() (bsc#1221061).\n- CVE-2023-7042: Fixed a null-pointer-dereference in ath10k_wmi_tlv_op_pull_mgmt_tx_compl_ev() (bsc#1218336).\n- CVE-2023-52476: Fixed possible unhandled page fault via perf sampling NMI during vsyscall (bsc#1220703).\n\n\nThe following non-security bugs were fixed:\n\n- Call flush_delayed_fput() from nfsd main-loop (bsc#1223380).\n- ibmvfc: make \u0027max_sectors\u0027 a module option (bsc#1216223).\n- scsi: Update max_hw_sectors on rescan (bsc#1216223).\n",
        "title": "Description of the patch"
      },
      {
        "category": "details",
        "text": "SUSE-2024-1647,SUSE-SLE-Micro-5.3-2024-1647,SUSE-SLE-Micro-5.4-2024-1647,openSUSE-Leap-Micro-5.3-2024-1647,openSUSE-Leap-Micro-5.4-2024-1647",
        "title": "Patchnames"
      },
      {
        "category": "legal_disclaimer",
        "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
        "title": "Terms of use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://www.suse.com/support/security/contact/",
      "name": "SUSE Product Security Team",
      "namespace": "https://www.suse.com/"
    },
    "references": [
      {
        "category": "external",
        "summary": "SUSE ratings",
        "url": "https://www.suse.com/support/security/rating/"
      },
      {
        "category": "self",
        "summary": "URL of this CSAF notice",
        "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2024_1647-1.json"
      },
      {
        "category": "self",
        "summary": "URL for SUSE-SU-2024:1647-1",
        "url": "https://www.suse.com/support/update/announcement/2024/suse-su-20241647-1/"
      },
      {
        "category": "self",
        "summary": "E-Mail link for SUSE-SU-2024:1647-1",
        "url": "https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1190576",
        "url": "https://bugzilla.suse.com/1190576"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1192145",
        "url": "https://bugzilla.suse.com/1192145"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1192354",
        "url": "https://bugzilla.suse.com/1192354"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1192837",
        "url": "https://bugzilla.suse.com/1192837"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1193629",
        "url": "https://bugzilla.suse.com/1193629"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1203906",
        "url": "https://bugzilla.suse.com/1203906"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1203935",
        "url": "https://bugzilla.suse.com/1203935"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1204614",
        "url": "https://bugzilla.suse.com/1204614"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1206881",
        "url": "https://bugzilla.suse.com/1206881"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1209657",
        "url": "https://bugzilla.suse.com/1209657"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1215221",
        "url": "https://bugzilla.suse.com/1215221"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1216223",
        "url": "https://bugzilla.suse.com/1216223"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1218336",
        "url": "https://bugzilla.suse.com/1218336"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1218479",
        "url": "https://bugzilla.suse.com/1218479"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1218562",
        "url": "https://bugzilla.suse.com/1218562"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1219104",
        "url": "https://bugzilla.suse.com/1219104"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1219126",
        "url": "https://bugzilla.suse.com/1219126"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1219169",
        "url": "https://bugzilla.suse.com/1219169"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1219170",
        "url": "https://bugzilla.suse.com/1219170"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1219264",
        "url": "https://bugzilla.suse.com/1219264"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1220342",
        "url": "https://bugzilla.suse.com/1220342"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1220703",
        "url": "https://bugzilla.suse.com/1220703"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1220761",
        "url": "https://bugzilla.suse.com/1220761"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1220883",
        "url": "https://bugzilla.suse.com/1220883"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1221044",
        "url": "https://bugzilla.suse.com/1221044"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1221061",
        "url": "https://bugzilla.suse.com/1221061"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1221088",
        "url": "https://bugzilla.suse.com/1221088"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1221293",
        "url": "https://bugzilla.suse.com/1221293"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1221299",
        "url": "https://bugzilla.suse.com/1221299"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1221612",
        "url": "https://bugzilla.suse.com/1221612"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1221830",
        "url": "https://bugzilla.suse.com/1221830"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222117",
        "url": "https://bugzilla.suse.com/1222117"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222422",
        "url": "https://bugzilla.suse.com/1222422"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222430",
        "url": "https://bugzilla.suse.com/1222430"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222435",
        "url": "https://bugzilla.suse.com/1222435"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222482",
        "url": "https://bugzilla.suse.com/1222482"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222503",
        "url": "https://bugzilla.suse.com/1222503"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222536",
        "url": "https://bugzilla.suse.com/1222536"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222559",
        "url": "https://bugzilla.suse.com/1222559"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222585",
        "url": "https://bugzilla.suse.com/1222585"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222618",
        "url": "https://bugzilla.suse.com/1222618"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222624",
        "url": "https://bugzilla.suse.com/1222624"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222660",
        "url": "https://bugzilla.suse.com/1222660"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222662",
        "url": "https://bugzilla.suse.com/1222662"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222664",
        "url": "https://bugzilla.suse.com/1222664"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222666",
        "url": "https://bugzilla.suse.com/1222666"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222671",
        "url": "https://bugzilla.suse.com/1222671"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222703",
        "url": "https://bugzilla.suse.com/1222703"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222704",
        "url": "https://bugzilla.suse.com/1222704"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222706",
        "url": "https://bugzilla.suse.com/1222706"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222709",
        "url": "https://bugzilla.suse.com/1222709"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222721",
        "url": "https://bugzilla.suse.com/1222721"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222726",
        "url": "https://bugzilla.suse.com/1222726"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222773",
        "url": "https://bugzilla.suse.com/1222773"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222776",
        "url": "https://bugzilla.suse.com/1222776"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222785",
        "url": "https://bugzilla.suse.com/1222785"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222787",
        "url": "https://bugzilla.suse.com/1222787"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222790",
        "url": "https://bugzilla.suse.com/1222790"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222791",
        "url": "https://bugzilla.suse.com/1222791"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222792",
        "url": "https://bugzilla.suse.com/1222792"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222796",
        "url": "https://bugzilla.suse.com/1222796"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222824",
        "url": "https://bugzilla.suse.com/1222824"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222829",
        "url": "https://bugzilla.suse.com/1222829"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222832",
        "url": "https://bugzilla.suse.com/1222832"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222836",
        "url": "https://bugzilla.suse.com/1222836"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222838",
        "url": "https://bugzilla.suse.com/1222838"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222866",
        "url": "https://bugzilla.suse.com/1222866"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222867",
        "url": "https://bugzilla.suse.com/1222867"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222869",
        "url": "https://bugzilla.suse.com/1222869"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222876",
        "url": "https://bugzilla.suse.com/1222876"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222878",
        "url": "https://bugzilla.suse.com/1222878"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222879",
        "url": "https://bugzilla.suse.com/1222879"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222881",
        "url": "https://bugzilla.suse.com/1222881"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222883",
        "url": "https://bugzilla.suse.com/1222883"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222888",
        "url": "https://bugzilla.suse.com/1222888"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222894",
        "url": "https://bugzilla.suse.com/1222894"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222901",
        "url": "https://bugzilla.suse.com/1222901"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223016",
        "url": "https://bugzilla.suse.com/1223016"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223187",
        "url": "https://bugzilla.suse.com/1223187"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223380",
        "url": "https://bugzilla.suse.com/1223380"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223474",
        "url": "https://bugzilla.suse.com/1223474"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223475",
        "url": "https://bugzilla.suse.com/1223475"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223477",
        "url": "https://bugzilla.suse.com/1223477"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223479",
        "url": "https://bugzilla.suse.com/1223479"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223482",
        "url": "https://bugzilla.suse.com/1223482"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223484",
        "url": "https://bugzilla.suse.com/1223484"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223487",
        "url": "https://bugzilla.suse.com/1223487"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223503",
        "url": "https://bugzilla.suse.com/1223503"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223505",
        "url": "https://bugzilla.suse.com/1223505"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223509",
        "url": "https://bugzilla.suse.com/1223509"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223513",
        "url": "https://bugzilla.suse.com/1223513"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223516",
        "url": "https://bugzilla.suse.com/1223516"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223517",
        "url": "https://bugzilla.suse.com/1223517"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223518",
        "url": "https://bugzilla.suse.com/1223518"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223519",
        "url": "https://bugzilla.suse.com/1223519"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223522",
        "url": "https://bugzilla.suse.com/1223522"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223523",
        "url": "https://bugzilla.suse.com/1223523"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223705",
        "url": "https://bugzilla.suse.com/1223705"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223824",
        "url": "https://bugzilla.suse.com/1223824"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47047 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47047/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47181 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47181/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47182 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47182/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47183 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47183/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47184 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47184/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47185 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47185/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47187 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47187/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47188 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47188/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47189 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47189/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47191 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47191/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47192 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47192/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47193 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47193/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47194 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47194/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47195 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47195/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47196 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47196/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47197 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47197/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47198 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47198/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47199 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47199/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47200 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47200/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47201 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47201/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47202 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47202/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47203 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47203/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47204 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47204/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47205 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47205/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47206 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47206/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47207 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47207/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47209 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47209/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47210 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47210/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47211 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47211/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47212 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47212/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47215 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47215/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47216 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47216/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47217 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47217/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47218 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47218/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47219 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47219/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-48631 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-48631/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-48637 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-48637/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-48638 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-48638/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-48647 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-48647/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-48648 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-48648/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-48650 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-48650/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-48651 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-48651/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-48653 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-48653/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-48654 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-48654/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-48655 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-48655/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-48656 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-48656/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-48657 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-48657/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-48660 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-48660/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-48662 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-48662/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-48663 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-48663/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-48667 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-48667/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-48668 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-48668/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-0160 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-0160/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-52476 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-52476/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-52500 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-52500/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-52590 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-52590/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-52591 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-52591/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-52607 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-52607/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-52616 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-52616/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-52628 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-52628/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-7042 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-7042/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-7192 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-7192/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-0841 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-0841/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-22099 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-22099/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-23307 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-23307/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-23848 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-23848/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-23850 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-23850/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26601 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26601/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26610 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26610/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26614 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26614/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26642 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26642/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26687 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26687/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26688 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26688/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26689 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26689/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26704 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26704/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26727 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26727/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26733 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26733/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26739 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26739/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26764 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26764/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26766 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26766/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26773 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26773/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26792 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26792/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26816 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26816/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26898 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26898/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26903 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26903/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-27043 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-27043/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-27389 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-27389/"
      }
    ],
    "title": "Security update for the Linux Kernel",
    "tracking": {
      "current_release_date": "2024-05-14T14:30:56Z",
      "generator": {
        "date": "2024-05-14T14:30:56Z",
        "engine": {
          "name": "cve-database.git:bin/generate-csaf.pl",
          "version": "1"
        }
      },
      "id": "SUSE-SU-2024:1647-1",
      "initial_release_date": "2024-05-14T14:30:56Z",
      "revision_history": [
        {
          "date": "2024-05-14T14:30:56Z",
          "number": "1",
          "summary": "Current version"
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-devel-rt-5.14.21-150400.15.79.1.noarch",
                "product": {
                  "name": "kernel-devel-rt-5.14.21-150400.15.79.1.noarch",
                  "product_id": "kernel-devel-rt-5.14.21-150400.15.79.1.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-source-rt-5.14.21-150400.15.79.1.noarch",
                "product": {
                  "name": "kernel-source-rt-5.14.21-150400.15.79.1.noarch",
                  "product_id": "kernel-source-rt-5.14.21-150400.15.79.1.noarch"
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "cluster-md-kmp-rt-5.14.21-150400.15.79.1.x86_64",
                "product": {
                  "name": "cluster-md-kmp-rt-5.14.21-150400.15.79.1.x86_64",
                  "product_id": "cluster-md-kmp-rt-5.14.21-150400.15.79.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "dlm-kmp-rt-5.14.21-150400.15.79.1.x86_64",
                "product": {
                  "name": "dlm-kmp-rt-5.14.21-150400.15.79.1.x86_64",
                  "product_id": "dlm-kmp-rt-5.14.21-150400.15.79.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "gfs2-kmp-rt-5.14.21-150400.15.79.1.x86_64",
                "product": {
                  "name": "gfs2-kmp-rt-5.14.21-150400.15.79.1.x86_64",
                  "product_id": "gfs2-kmp-rt-5.14.21-150400.15.79.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-5.14.21-150400.15.79.1.x86_64",
                "product": {
                  "name": "kernel-rt-5.14.21-150400.15.79.1.x86_64",
                  "product_id": "kernel-rt-5.14.21-150400.15.79.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-devel-5.14.21-150400.15.79.1.x86_64",
                "product": {
                  "name": "kernel-rt-devel-5.14.21-150400.15.79.1.x86_64",
                  "product_id": "kernel-rt-devel-5.14.21-150400.15.79.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-extra-5.14.21-150400.15.79.1.x86_64",
                "product": {
                  "name": "kernel-rt-extra-5.14.21-150400.15.79.1.x86_64",
                  "product_id": "kernel-rt-extra-5.14.21-150400.15.79.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-livepatch-5.14.21-150400.15.79.1.x86_64",
                "product": {
                  "name": "kernel-rt-livepatch-5.14.21-150400.15.79.1.x86_64",
                  "product_id": "kernel-rt-livepatch-5.14.21-150400.15.79.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-livepatch-devel-5.14.21-150400.15.79.1.x86_64",
                "product": {
                  "name": "kernel-rt-livepatch-devel-5.14.21-150400.15.79.1.x86_64",
                  "product_id": "kernel-rt-livepatch-devel-5.14.21-150400.15.79.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-optional-5.14.21-150400.15.79.1.x86_64",
                "product": {
                  "name": "kernel-rt-optional-5.14.21-150400.15.79.1.x86_64",
                  "product_id": "kernel-rt-optional-5.14.21-150400.15.79.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt_debug-5.14.21-150400.15.79.1.x86_64",
                "product": {
                  "name": "kernel-rt_debug-5.14.21-150400.15.79.1.x86_64",
                  "product_id": "kernel-rt_debug-5.14.21-150400.15.79.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt_debug-devel-5.14.21-150400.15.79.1.x86_64",
                "product": {
                  "name": "kernel-rt_debug-devel-5.14.21-150400.15.79.1.x86_64",
                  "product_id": "kernel-rt_debug-devel-5.14.21-150400.15.79.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt_debug-livepatch-devel-5.14.21-150400.15.79.1.x86_64",
                "product": {
                  "name": "kernel-rt_debug-livepatch-devel-5.14.21-150400.15.79.1.x86_64",
                  "product_id": "kernel-rt_debug-livepatch-devel-5.14.21-150400.15.79.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-syms-rt-5.14.21-150400.15.79.1.x86_64",
                "product": {
                  "name": "kernel-syms-rt-5.14.21-150400.15.79.1.x86_64",
                  "product_id": "kernel-syms-rt-5.14.21-150400.15.79.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kselftests-kmp-rt-5.14.21-150400.15.79.1.x86_64",
                "product": {
                  "name": "kselftests-kmp-rt-5.14.21-150400.15.79.1.x86_64",
                  "product_id": "kselftests-kmp-rt-5.14.21-150400.15.79.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "ocfs2-kmp-rt-5.14.21-150400.15.79.1.x86_64",
                "product": {
                  "name": "ocfs2-kmp-rt-5.14.21-150400.15.79.1.x86_64",
                  "product_id": "ocfs2-kmp-rt-5.14.21-150400.15.79.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "reiserfs-kmp-rt-5.14.21-150400.15.79.1.x86_64",
                "product": {
                  "name": "reiserfs-kmp-rt-5.14.21-150400.15.79.1.x86_64",
                  "product_id": "reiserfs-kmp-rt-5.14.21-150400.15.79.1.x86_64"
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Micro 5.3",
                "product": {
                  "name": "SUSE Linux Enterprise Micro 5.3",
                  "product_id": "SUSE Linux Enterprise Micro 5.3",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-micro:5.3"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Micro 5.4",
                "product": {
                  "name": "SUSE Linux Enterprise Micro 5.4",
                  "product_id": "SUSE Linux Enterprise Micro 5.4",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-micro:5.4"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "openSUSE Leap Micro 5.3",
                "product": {
                  "name": "openSUSE Leap Micro 5.3",
                  "product_id": "openSUSE Leap Micro 5.3",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:opensuse:leap-micro:5.3"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "openSUSE Leap Micro 5.4",
                "product": {
                  "name": "openSUSE Leap Micro 5.4",
                  "product_id": "openSUSE Leap Micro 5.4",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:opensuse:leap-micro:5.4"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "SUSE Linux Enterprise"
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-5.14.21-150400.15.79.1.x86_64 as component of SUSE Linux Enterprise Micro 5.3",
          "product_id": "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64"
        },
        "product_reference": "kernel-rt-5.14.21-150400.15.79.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-rt-5.14.21-150400.15.79.1.noarch as component of SUSE Linux Enterprise Micro 5.3",
          "product_id": "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch"
        },
        "product_reference": "kernel-source-rt-5.14.21-150400.15.79.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-5.14.21-150400.15.79.1.x86_64 as component of SUSE Linux Enterprise Micro 5.4",
          "product_id": "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
        },
        "product_reference": "kernel-rt-5.14.21-150400.15.79.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-rt-5.14.21-150400.15.79.1.noarch as component of SUSE Linux Enterprise Micro 5.4",
          "product_id": "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch"
        },
        "product_reference": "kernel-source-rt-5.14.21-150400.15.79.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-5.14.21-150400.15.79.1.x86_64 as component of openSUSE Leap Micro 5.3",
          "product_id": "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64"
        },
        "product_reference": "kernel-rt-5.14.21-150400.15.79.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap Micro 5.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-5.14.21-150400.15.79.1.x86_64 as component of openSUSE Leap Micro 5.4",
          "product_id": "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
        },
        "product_reference": "kernel-rt-5.14.21-150400.15.79.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap Micro 5.4"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2021-47047",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47047"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nspi: spi-zynqmp-gqspi: return -ENOMEM if dma_map_single fails\n\nThe spi controller supports 44-bit address space on AXI in DMA mode,\nso set dma_addr_t width to 44-bit to avoid using a swiotlb mapping.\nIn addition, if dma_map_single fails, it should return immediately\ninstead of continuing doing the DMA operation which bases on invalid\naddress.\n\nThis fixes the following crash which occurs in reading a big block\nfrom flash:\n\n[  123.633577] zynqmp-qspi ff0f0000.spi: swiotlb buffer is full (sz: 4194304 bytes), total 32768 (slots), used 0 (slots)\n[  123.644230] zynqmp-qspi ff0f0000.spi: ERR:rxdma:memory not mapped\n[  123.784625] Unable to handle kernel paging request at virtual address 00000000003fffc0\n[  123.792536] Mem abort info:\n[  123.795313]   ESR = 0x96000145\n[  123.798351]   EC = 0x25: DABT (current EL), IL = 32 bits\n[  123.803655]   SET = 0, FnV = 0\n[  123.806693]   EA = 0, S1PTW = 0\n[  123.809818] Data abort info:\n[  123.812683]   ISV = 0, ISS = 0x00000145\n[  123.816503]   CM = 1, WnR = 1\n[  123.819455] user pgtable: 4k pages, 48-bit VAs, pgdp=0000000805047000\n[  123.825887] [00000000003fffc0] pgd=0000000803b45003, p4d=0000000803b45003, pud=0000000000000000\n[  123.834586] Internal error: Oops: 96000145 [#1] PREEMPT SMP",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
          "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47047",
          "url": "https://www.suse.com/security/cve/CVE-2021-47047"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1220761 for CVE-2021-47047",
          "url": "https://bugzilla.suse.com/1220761"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.6,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:30:56Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47047"
    },
    {
      "cve": "CVE-2021-47181",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47181"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: musb: tusb6010: check return value after calling platform_get_resource()\n\nIt will cause null-ptr-deref if platform_get_resource() returns NULL,\nwe need check the return value.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
          "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47181",
          "url": "https://www.suse.com/security/cve/CVE-2021-47181"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222660 for CVE-2021-47181",
          "url": "https://bugzilla.suse.com/1222660"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:30:56Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47181"
    },
    {
      "cve": "CVE-2021-47182",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47182"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: core: Fix scsi_mode_sense() buffer length handling\n\nSeveral problems exist with scsi_mode_sense() buffer length handling:\n\n 1) The allocation length field of the MODE SENSE(10) command is 16-bits,\n    occupying bytes 7 and 8 of the CDB. With this command, access to mode\n    pages larger than 255 bytes is thus possible. However, the CDB\n    allocation length field is set by assigning len to byte 8 only, thus\n    truncating buffer length larger than 255.\n\n 2) If scsi_mode_sense() is called with len smaller than 8 with\n    sdev-\u003euse_10_for_ms set, or smaller than 4 otherwise, the buffer length\n    is increased to 8 and 4 respectively, and the buffer is zero filled\n    with these increased values, thus corrupting the memory following the\n    buffer.\n\nFix these 2 problems by using put_unaligned_be16() to set the allocation\nlength field of MODE SENSE(10) CDB and by returning an error when len is\ntoo small.\n\nFurthermore, if len is larger than 255B, always try MODE SENSE(10) first,\neven if the device driver did not set sdev-\u003euse_10_for_ms. In case of\ninvalid opcode error for MODE SENSE(10), access to mode pages larger than\n255 bytes are not retried using MODE SENSE(6). To avoid buffer length\noverflows for the MODE_SENSE(10) case, check that len is smaller than 65535\nbytes.\n\nWhile at it, also fix the folowing:\n\n * Use get_unaligned_be16() to retrieve the mode data length and block\n   descriptor length fields of the mode sense reply header instead of using\n   an open coded calculation.\n\n * Fix the kdoc dbd argument explanation: the DBD bit stands for Disable\n   Block Descriptor, which is the opposite of what the dbd argument\n   description was.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
          "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47182",
          "url": "https://www.suse.com/security/cve/CVE-2021-47182"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222662 for CVE-2021-47182",
          "url": "https://bugzilla.suse.com/1222662"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:30:56Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47182"
    },
    {
      "cve": "CVE-2021-47183",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47183"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: lpfc: Fix link down processing to address NULL pointer dereference\n\nIf an FC link down transition while PLOGIs are outstanding to fabric well\nknown addresses, outstanding ABTS requests may result in a NULL pointer\ndereference. Driver unload requests may hang with repeated \"2878\" log\nmessages.\n\nThe Link down processing results in ABTS requests for outstanding ELS\nrequests. The Abort WQEs are sent for the ELSs before the driver had set\nthe link state to down. Thus the driver is sending the Abort with the\nexpectation that an ABTS will be sent on the wire. The Abort request is\nstalled waiting for the link to come up. In some conditions the driver may\nauto-complete the ELSs thus if the link does come up, the Abort completions\nmay reference an invalid structure.\n\nFix by ensuring that Abort set the flag to avoid link traffic if issued due\nto conditions where the link failed.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
          "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47183",
          "url": "https://www.suse.com/security/cve/CVE-2021-47183"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222664 for CVE-2021-47183",
          "url": "https://bugzilla.suse.com/1222664"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:30:56Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47183"
    },
    {
      "cve": "CVE-2021-47184",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47184"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ni40e: Fix NULL ptr dereference on VSI filter sync\n\nRemove the reason of null pointer dereference in sync VSI filters.\nAdded new I40E_VSI_RELEASING flag to signalize deleting and releasing\nof VSI resources to sync this thread with sync filters subtask.\nWithout this patch it is possible to start update the VSI filter list\nafter VSI is removed, that\u0027s causing a kernel oops.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
          "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47184",
          "url": "https://www.suse.com/security/cve/CVE-2021-47184"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222666 for CVE-2021-47184",
          "url": "https://bugzilla.suse.com/1222666"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:30:56Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47184"
    },
    {
      "cve": "CVE-2021-47185",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47185"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntty: tty_buffer: Fix the softlockup issue in flush_to_ldisc\n\nWhen running ltp testcase(ltp/testcases/kernel/pty/pty04.c) with arm64, there is a soft lockup,\nwhich look like this one:\n\n  Workqueue: events_unbound flush_to_ldisc\n  Call trace:\n   dump_backtrace+0x0/0x1ec\n   show_stack+0x24/0x30\n   dump_stack+0xd0/0x128\n   panic+0x15c/0x374\n   watchdog_timer_fn+0x2b8/0x304\n   __run_hrtimer+0x88/0x2c0\n   __hrtimer_run_queues+0xa4/0x120\n   hrtimer_interrupt+0xfc/0x270\n   arch_timer_handler_phys+0x40/0x50\n   handle_percpu_devid_irq+0x94/0x220\n   __handle_domain_irq+0x88/0xf0\n   gic_handle_irq+0x84/0xfc\n   el1_irq+0xc8/0x180\n   slip_unesc+0x80/0x214 [slip]\n   tty_ldisc_receive_buf+0x64/0x80\n   tty_port_default_receive_buf+0x50/0x90\n   flush_to_ldisc+0xbc/0x110\n   process_one_work+0x1d4/0x4b0\n   worker_thread+0x180/0x430\n   kthread+0x11c/0x120\n\nIn the testcase pty04, The first process call the write syscall to send\ndata to the pty master. At the same time, the workqueue will do the\nflush_to_ldisc to pop data in a loop until there is no more data left.\nWhen the sender and workqueue running in different core, the sender sends\ndata fastly in full time which will result in workqueue doing work in loop\nfor a long time and occuring softlockup in flush_to_ldisc with kernel\nconfigured without preempt. So I add need_resched check and cond_resched\nin the flush_to_ldisc loop to avoid it.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
          "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47185",
          "url": "https://www.suse.com/security/cve/CVE-2021-47185"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222669 for CVE-2021-47185",
          "url": "https://bugzilla.suse.com/1222669"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:30:56Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47185"
    },
    {
      "cve": "CVE-2021-47187",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47187"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\narm64: dts: qcom: msm8998: Fix CPU/L2 idle state latency and residency\n\nThe entry/exit latency and minimum residency in state for the idle\nstates of MSM8998 were ..bad: first of all, for all of them the\ntimings were written for CPU sleep but the min-residency-us param\nwas miscalculated (supposedly, while porting this from downstream);\nThen, the power collapse states are setting PC on both the CPU\ncluster *and* the L2 cache, which have different timings: in the\nspecific case of L2 the times are higher so these ones should be\ntaken into account instead of the CPU ones.\n\nThis parameter misconfiguration was not giving particular issues\nbecause on MSM8998 there was no CPU scaling at all, so cluster/L2\npower collapse was rarely (if ever) hit.\nWhen CPU scaling is enabled, though, the wrong timings will produce\nSoC unstability shown to the user as random, apparently error-less,\nsudden reboots and/or lockups.\n\nThis set of parameters are stabilizing the SoC when CPU scaling is\nON and when power collapse is frequently hit.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
          "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47187",
          "url": "https://www.suse.com/security/cve/CVE-2021-47187"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222703 for CVE-2021-47187",
          "url": "https://bugzilla.suse.com/1222703"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:30:56Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47187"
    },
    {
      "cve": "CVE-2021-47188",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47188"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: ufs: core: Improve SCSI abort handling\n\nThe following has been observed on a test setup:\n\nWARNING: CPU: 4 PID: 250 at drivers/scsi/ufs/ufshcd.c:2737 ufshcd_queuecommand+0x468/0x65c\nCall trace:\n ufshcd_queuecommand+0x468/0x65c\n scsi_send_eh_cmnd+0x224/0x6a0\n scsi_eh_test_devices+0x248/0x418\n scsi_eh_ready_devs+0xc34/0xe58\n scsi_error_handler+0x204/0x80c\n kthread+0x150/0x1b4\n ret_from_fork+0x10/0x30\n\nThat warning is triggered by the following statement:\n\n\tWARN_ON(lrbp-\u003ecmd);\n\nFix this warning by clearing lrbp-\u003ecmd from the abort handler.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
          "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47188",
          "url": "https://www.suse.com/security/cve/CVE-2021-47188"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222671 for CVE-2021-47188",
          "url": "https://bugzilla.suse.com/1222671"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:30:56Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47188"
    },
    {
      "cve": "CVE-2021-47189",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47189"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: fix memory ordering between normal and ordered work functions\n\nOrdered work functions aren\u0027t guaranteed to be handled by the same thread\nwhich executed the normal work functions. The only way execution between\nnormal/ordered functions is synchronized is via the WORK_DONE_BIT,\nunfortunately the used bitops don\u0027t guarantee any ordering whatsoever.\n\nThis manifested as seemingly inexplicable crashes on ARM64, where\nasync_chunk::inode is seen as non-null in async_cow_submit which causes\nsubmit_compressed_extents to be called and crash occurs because\nasync_chunk::inode suddenly became NULL. The call trace was similar to:\n\n    pc : submit_compressed_extents+0x38/0x3d0\n    lr : async_cow_submit+0x50/0xd0\n    sp : ffff800015d4bc20\n\n    \u003cregisters omitted for brevity\u003e\n\n    Call trace:\n     submit_compressed_extents+0x38/0x3d0\n     async_cow_submit+0x50/0xd0\n     run_ordered_work+0xc8/0x280\n     btrfs_work_helper+0x98/0x250\n     process_one_work+0x1f0/0x4ac\n     worker_thread+0x188/0x504\n     kthread+0x110/0x114\n     ret_from_fork+0x10/0x18\n\nFix this by adding respective barrier calls which ensure that all\naccesses preceding setting of WORK_DONE_BIT are strictly ordered before\nsetting the flag. At the same time add a read barrier after reading of\nWORK_DONE_BIT in run_ordered_work which ensures all subsequent loads\nwould be strictly ordered after reading the bit. This in turn ensures\nare all accesses before WORK_DONE_BIT are going to be strictly ordered\nbefore any access that can occur in ordered_func.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
          "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47189",
          "url": "https://www.suse.com/security/cve/CVE-2021-47189"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222706 for CVE-2021-47189",
          "url": "https://bugzilla.suse.com/1222706"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:30:56Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47189"
    },
    {
      "cve": "CVE-2021-47191",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47191"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: scsi_debug: Fix out-of-bound read in resp_readcap16()\n\nThe following warning was observed running syzkaller:\n\n[ 3813.830724] sg_write: data in/out 65466/242 bytes for SCSI command 0x9e-- guessing data in;\n[ 3813.830724]    program syz-executor not setting count and/or reply_len properly\n[ 3813.836956] ==================================================================\n[ 3813.839465] BUG: KASAN: stack-out-of-bounds in sg_copy_buffer+0x157/0x1e0\n[ 3813.841773] Read of size 4096 at addr ffff8883cf80f540 by task syz-executor/1549\n[ 3813.846612] Call Trace:\n[ 3813.846995]  dump_stack+0x108/0x15f\n[ 3813.847524]  print_address_description+0xa5/0x372\n[ 3813.848243]  kasan_report.cold+0x236/0x2a8\n[ 3813.849439]  check_memory_region+0x240/0x270\n[ 3813.850094]  memcpy+0x30/0x80\n[ 3813.850553]  sg_copy_buffer+0x157/0x1e0\n[ 3813.853032]  sg_copy_from_buffer+0x13/0x20\n[ 3813.853660]  fill_from_dev_buffer+0x135/0x370\n[ 3813.854329]  resp_readcap16+0x1ac/0x280\n[ 3813.856917]  schedule_resp+0x41f/0x1630\n[ 3813.858203]  scsi_debug_queuecommand+0xb32/0x17e0\n[ 3813.862699]  scsi_dispatch_cmd+0x330/0x950\n[ 3813.863329]  scsi_request_fn+0xd8e/0x1710\n[ 3813.863946]  __blk_run_queue+0x10b/0x230\n[ 3813.864544]  blk_execute_rq_nowait+0x1d8/0x400\n[ 3813.865220]  sg_common_write.isra.0+0xe61/0x2420\n[ 3813.871637]  sg_write+0x6c8/0xef0\n[ 3813.878853]  __vfs_write+0xe4/0x800\n[ 3813.883487]  vfs_write+0x17b/0x530\n[ 3813.884008]  ksys_write+0x103/0x270\n[ 3813.886268]  __x64_sys_write+0x77/0xc0\n[ 3813.886841]  do_syscall_64+0x106/0x360\n[ 3813.887415]  entry_SYSCALL_64_after_hwframe+0x44/0xa9\n\nThis issue can be reproduced with the following syzkaller log:\n\nr0 = openat(0xffffffffffffff9c, \u0026(0x7f0000000040)=\u0027./file0\\x00\u0027, 0x26e1, 0x0)\nr1 = syz_open_procfs(0xffffffffffffffff, \u0026(0x7f0000000000)=\u0027fd/3\\x00\u0027)\nopen_by_handle_at(r1, \u0026(0x7f00000003c0)=ANY=[@ANYRESHEX], 0x602000)\nr2 = syz_open_dev$sg(\u0026(0x7f0000000000), 0x0, 0x40782)\nwrite$binfmt_aout(r2, \u0026(0x7f0000000340)=ANY=[@ANYBLOB=\"00000000deff000000000000000000000000000000000000000000000000000047f007af9e107a41ec395f1bded7be24277a1501ff6196a83366f4e6362bc0ff2b247f68a972989b094b2da4fb3607fcf611a22dd04310d28c75039d\"], 0x126)\n\nIn resp_readcap16() we get \"int alloc_len\" value -1104926854, and then pass\nthe huge arr_len to fill_from_dev_buffer(), but arr is only 32 bytes. This\nleads to OOB in sg_copy_buffer().\n\nTo solve this issue, define alloc_len as u32.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
          "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47191",
          "url": "https://www.suse.com/security/cve/CVE-2021-47191"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222866 for CVE-2021-47191",
          "url": "https://bugzilla.suse.com/1222866"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:30:56Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47191"
    },
    {
      "cve": "CVE-2021-47192",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47192"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: core: sysfs: Fix hang when device state is set via sysfs\n\nThis fixes a regression added with:\n\ncommit f0f82e2476f6 (\"scsi: core: Fix capacity set to zero after\nofflinining device\")\n\nThe problem is that after iSCSI recovery, iscsid will call into the kernel\nto set the dev\u0027s state to running, and with that patch we now call\nscsi_rescan_device() with the state_mutex held. If the SCSI error handler\nthread is just starting to test the device in scsi_send_eh_cmnd() then it\u0027s\ngoing to try to grab the state_mutex.\n\nWe are then stuck, because when scsi_rescan_device() tries to send its I/O\nscsi_queue_rq() calls -\u003e scsi_host_queue_ready() -\u003e scsi_host_in_recovery()\nwhich will return true (the host state is still in recovery) and I/O will\njust be requeued. scsi_send_eh_cmnd() will then never be able to grab the\nstate_mutex to finish error handling.\n\nTo prevent the deadlock move the rescan-related code to after we drop the\nstate_mutex.\n\nThis also adds a check for if we are already in the running state. This\nprevents extra scans and helps the iscsid case where if the transport class\nhas already onlined the device during its recovery process then we don\u0027t\nneed userspace to do it again plus possibly block that daemon.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
          "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47192",
          "url": "https://www.suse.com/security/cve/CVE-2021-47192"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222867 for CVE-2021-47192",
          "url": "https://bugzilla.suse.com/1222867"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:30:56Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47192"
    },
    {
      "cve": "CVE-2021-47193",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47193"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: pm80xx: Fix memory leak during rmmod\n\nDriver failed to release all memory allocated. This would lead to memory\nleak during driver removal.\n\nProperly free memory when the module is removed.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
          "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47193",
          "url": "https://www.suse.com/security/cve/CVE-2021-47193"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222879 for CVE-2021-47193",
          "url": "https://bugzilla.suse.com/1222879"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:30:56Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47193"
    },
    {
      "cve": "CVE-2021-47194",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47194"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncfg80211: call cfg80211_stop_ap when switch from P2P_GO type\n\nIf the userspace tools switch from NL80211_IFTYPE_P2P_GO to\nNL80211_IFTYPE_ADHOC via send_msg(NL80211_CMD_SET_INTERFACE), it\ndoes not call the cleanup cfg80211_stop_ap(), this leads to the\ninitialization of in-use data. For example, this path re-init the\nsdata-\u003eassigned_chanctx_list while it is still an element of\nassigned_vifs list, and makes that linked list corrupt.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
          "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47194",
          "url": "https://www.suse.com/security/cve/CVE-2021-47194"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222829 for CVE-2021-47194",
          "url": "https://bugzilla.suse.com/1222829"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:30:56Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47194"
    },
    {
      "cve": "CVE-2021-47195",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47195"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nspi: fix use-after-free of the add_lock mutex\n\nCommit 6098475d4cb4 (\"spi: Fix deadlock when adding SPI controllers on\nSPI buses\") introduced a per-controller mutex. But mutex_unlock() of\nsaid lock is called after the controller is already freed:\n\n  spi_unregister_controller(ctlr)\n  -\u003e put_device(\u0026ctlr-\u003edev)\n    -\u003e spi_controller_release(dev)\n  -\u003e mutex_unlock(\u0026ctrl-\u003eadd_lock)\n\nMove the put_device() after the mutex_unlock().",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
          "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47195",
          "url": "https://www.suse.com/security/cve/CVE-2021-47195"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222832 for CVE-2021-47195",
          "url": "https://bugzilla.suse.com/1222832"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:30:56Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47195"
    },
    {
      "cve": "CVE-2021-47196",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47196"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/core: Set send and receive CQ before forwarding to the driver\n\nPreset both receive and send CQ pointers prior to call to the drivers and\noverwrite it later again till the mlx4 is going to be changed do not\noverwrite ibqp properties.\n\nThis change is needed for mlx5, because in case of QP creation failure, it\nwill go to the path of QP destroy which relies on proper CQ pointers.\n\n BUG: KASAN: use-after-free in create_qp.cold+0x164/0x16e [mlx5_ib]\n Write of size 8 at addr ffff8880064c55c0 by task a.out/246\n\n CPU: 0 PID: 246 Comm: a.out Not tainted 5.15.0+ #291\n Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014\n Call Trace:\n  dump_stack_lvl+0x45/0x59\n  print_address_description.constprop.0+0x1f/0x140\n  kasan_report.cold+0x83/0xdf\n  create_qp.cold+0x164/0x16e [mlx5_ib]\n  mlx5_ib_create_qp+0x358/0x28a0 [mlx5_ib]\n  create_qp.part.0+0x45b/0x6a0 [ib_core]\n  ib_create_qp_user+0x97/0x150 [ib_core]\n  ib_uverbs_handler_UVERBS_METHOD_QP_CREATE+0x92c/0x1250 [ib_uverbs]\n  ib_uverbs_cmd_verbs+0x1c38/0x3150 [ib_uverbs]\n  ib_uverbs_ioctl+0x169/0x260 [ib_uverbs]\n  __x64_sys_ioctl+0x866/0x14d0\n  do_syscall_64+0x3d/0x90\n  entry_SYSCALL_64_after_hwframe+0x44/0xae\n\n Allocated by task 246:\n  kasan_save_stack+0x1b/0x40\n  __kasan_kmalloc+0xa4/0xd0\n  create_qp.part.0+0x92/0x6a0 [ib_core]\n  ib_create_qp_user+0x97/0x150 [ib_core]\n  ib_uverbs_handler_UVERBS_METHOD_QP_CREATE+0x92c/0x1250 [ib_uverbs]\n  ib_uverbs_cmd_verbs+0x1c38/0x3150 [ib_uverbs]\n  ib_uverbs_ioctl+0x169/0x260 [ib_uverbs]\n  __x64_sys_ioctl+0x866/0x14d0\n  do_syscall_64+0x3d/0x90\n  entry_SYSCALL_64_after_hwframe+0x44/0xae\n\n Freed by task 246:\n  kasan_save_stack+0x1b/0x40\n  kasan_set_track+0x1c/0x30\n  kasan_set_free_info+0x20/0x30\n  __kasan_slab_free+0x10c/0x150\n  slab_free_freelist_hook+0xb4/0x1b0\n  kfree+0xe7/0x2a0\n  create_qp.part.0+0x52b/0x6a0 [ib_core]\n  ib_create_qp_user+0x97/0x150 [ib_core]\n  ib_uverbs_handler_UVERBS_METHOD_QP_CREATE+0x92c/0x1250 [ib_uverbs]\n  ib_uverbs_cmd_verbs+0x1c38/0x3150 [ib_uverbs]\n  ib_uverbs_ioctl+0x169/0x260 [ib_uverbs]\n  __x64_sys_ioctl+0x866/0x14d0\n  do_syscall_64+0x3d/0x90\n  entry_SYSCALL_64_after_hwframe+0x44/0xae",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
          "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47196",
          "url": "https://www.suse.com/security/cve/CVE-2021-47196"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222773 for CVE-2021-47196",
          "url": "https://bugzilla.suse.com/1222773"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:30:56Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47196"
    },
    {
      "cve": "CVE-2021-47197",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47197"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/mlx5e: nullify cq-\u003edbg pointer in mlx5_debug_cq_remove()\n\nPrior to this patch in case mlx5_core_destroy_cq() failed it proceeds\nto rest of destroy operations. mlx5_core_destroy_cq() could be called again\nby user and cause additional call of mlx5_debug_cq_remove().\ncq-\u003edbg was not nullify in previous call and cause the crash.\n\nFix it by nullify cq-\u003edbg pointer after removal.\n\nAlso proceed to destroy operations only if FW return 0\nfor MLX5_CMD_OP_DESTROY_CQ command.\n\ngeneral protection fault, probably for non-canonical address 0x2000300004058: 0000 [#1] SMP PTI\nCPU: 5 PID: 1228 Comm: python Not tainted 5.15.0-rc5_for_upstream_min_debug_2021_10_14_11_06 #1\nHardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014\nRIP: 0010:lockref_get+0x1/0x60\nCode: 5d e9 53 ff ff ff 48 8d 7f 70 e8 0a 2e 48 00 c7 85 d0 00 00 00 02\n00 00 00 c6 45 70 00 fb 5d c3 c3 cc cc cc cc cc cc cc cc 53 \u003c48\u003e 8b 17\n48 89 fb 85 d2 75 3d 48 89 d0 bf 64 00 00 00 48 89 c1 48\nRSP: 0018:ffff888137dd7a38 EFLAGS: 00010206\nRAX: 0000000000000000 RBX: ffff888107d5f458 RCX: 00000000fffffffe\nRDX: 000000000002c2b0 RSI: ffffffff8155e2e0 RDI: 0002000300004058\nRBP: ffff888137dd7a88 R08: 0002000300004058 R09: ffff8881144a9f88\nR10: 0000000000000000 R11: 0000000000000000 R12: ffff8881141d4000\nR13: ffff888137dd7c68 R14: ffff888137dd7d58 R15: ffff888137dd7cc0\nFS:  00007f4644f2a4c0(0000) GS:ffff8887a2d40000(0000)\nknlGS:0000000000000000\nCS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 000055b4500f4380 CR3: 0000000114f7a003 CR4: 0000000000170ea0\nCall Trace:\n  simple_recursive_removal+0x33/0x2e0\n  ? debugfs_remove+0x60/0x60\n  debugfs_remove+0x40/0x60\n  mlx5_debug_cq_remove+0x32/0x70 [mlx5_core]\n  mlx5_core_destroy_cq+0x41/0x1d0 [mlx5_core]\n  devx_obj_cleanup+0x151/0x330 [mlx5_ib]\n  ? __pollwait+0xd0/0xd0\n  ? xas_load+0x5/0x70\n  ? xa_load+0x62/0xa0\n  destroy_hw_idr_uobject+0x20/0x80 [ib_uverbs]\n  uverbs_destroy_uobject+0x3b/0x360 [ib_uverbs]\n  uobj_destroy+0x54/0xa0 [ib_uverbs]\n  ib_uverbs_cmd_verbs+0xaf2/0x1160 [ib_uverbs]\n  ? uverbs_finalize_object+0xd0/0xd0 [ib_uverbs]\n  ib_uverbs_ioctl+0xc4/0x1b0 [ib_uverbs]\n  __x64_sys_ioctl+0x3e4/0x8e0",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
          "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47197",
          "url": "https://www.suse.com/security/cve/CVE-2021-47197"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222776 for CVE-2021-47197",
          "url": "https://bugzilla.suse.com/1222776"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:30:56Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47197"
    },
    {
      "cve": "CVE-2021-47198",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47198"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: lpfc: Fix use-after-free in lpfc_unreg_rpi() routine\n\nAn error is detected with the following report when unloading the driver:\n  \"KASAN: use-after-free in lpfc_unreg_rpi+0x1b1b\"\n\nThe NLP_REG_LOGIN_SEND nlp_flag is set in lpfc_reg_fab_ctrl_node(), but the\nflag is not cleared upon completion of the login.\n\nThis allows a second call to lpfc_unreg_rpi() to proceed with nlp_rpi set\nto LPFC_RPI_ALLOW_ERROR.  This results in a use after free access when used\nas an rpi_ids array index.\n\nFix by clearing the NLP_REG_LOGIN_SEND nlp_flag in\nlpfc_mbx_cmpl_fc_reg_login().",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
          "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47198",
          "url": "https://www.suse.com/security/cve/CVE-2021-47198"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222883 for CVE-2021-47198",
          "url": "https://bugzilla.suse.com/1222883"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:30:56Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47198"
    },
    {
      "cve": "CVE-2021-47199",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47199"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/mlx5e: CT, Fix multiple allocations and memleak of mod acts\n\nCT clear action offload adds additional mod hdr actions to the\nflow\u0027s original mod actions in order to clear the registers which\nhold ct_state.\nWhen such flow also includes encap action, a neigh update event\ncan cause the driver to unoffload the flow and then reoffload it.\n\nEach time this happens, the ct clear handling adds that same set\nof mod hdr actions to reset ct_state until the max of mod hdr\nactions is reached.\n\nAlso the driver never releases the allocated mod hdr actions and\ncausing a memleak.\n\nFix above two issues by moving CT clear mod acts allocation\ninto the parsing actions phase and only use it when offloading the rule.\nThe release of mod acts will be done in the normal flow_put().\n\n backtrace:\n    [\u003c000000007316e2f3\u003e] krealloc+0x83/0xd0\n    [\u003c00000000ef157de1\u003e] mlx5e_mod_hdr_alloc+0x147/0x300 [mlx5_core]\n    [\u003c00000000970ce4ae\u003e] mlx5e_tc_match_to_reg_set_and_get_id+0xd7/0x240 [mlx5_core]\n    [\u003c0000000067c5fa17\u003e] mlx5e_tc_match_to_reg_set+0xa/0x20 [mlx5_core]\n    [\u003c00000000d032eb98\u003e] mlx5_tc_ct_entry_set_registers.isra.0+0x36/0xc0 [mlx5_core]\n    [\u003c00000000fd23b869\u003e] mlx5_tc_ct_flow_offload+0x272/0x1f10 [mlx5_core]\n    [\u003c000000004fc24acc\u003e] mlx5e_tc_offload_fdb_rules.part.0+0x150/0x620 [mlx5_core]\n    [\u003c00000000dc741c17\u003e] mlx5e_tc_encap_flows_add+0x489/0x690 [mlx5_core]\n    [\u003c00000000e92e49d7\u003e] mlx5e_rep_update_flows+0x6e4/0x9b0 [mlx5_core]\n    [\u003c00000000f60f5602\u003e] mlx5e_rep_neigh_update+0x39a/0x5d0 [mlx5_core]",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
          "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47199",
          "url": "https://www.suse.com/security/cve/CVE-2021-47199"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222785 for CVE-2021-47199",
          "url": "https://bugzilla.suse.com/1222785"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:30:56Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47199"
    },
    {
      "cve": "CVE-2021-47200",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47200"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/prime: Fix use after free in mmap with drm_gem_ttm_mmap\n\ndrm_gem_ttm_mmap() drops a reference to the gem object on success. If\nthe gem object\u0027s refcount == 1 on entry to drm_gem_prime_mmap(), that\ndrop will free the gem object, and the subsequent drm_gem_object_get()\nwill be a UAF. Fix by grabbing a reference before calling the mmap\nhelper.\n\nThis issue was forseen when the reference dropping was adding in\ncommit 9786b65bc61ac (\"drm/ttm: fix mmap refcounting\"):\n  \"For that to work properly the drm_gem_object_get() call in\n  drm_gem_ttm_mmap() must be moved so it happens before calling\n  obj-\u003efuncs-\u003emmap(), otherwise the gem refcount would go down\n  to zero.\"",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
          "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47200",
          "url": "https://www.suse.com/security/cve/CVE-2021-47200"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222838 for CVE-2021-47200",
          "url": "https://bugzilla.suse.com/1222838"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:30:56Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47200"
    },
    {
      "cve": "CVE-2021-47201",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47201"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\niavf: free q_vectors before queues in iavf_disable_vf\n\niavf_free_queues() clears adapter-\u003enum_active_queues, which\niavf_free_q_vectors() relies on, so swap the order of these two function\ncalls in iavf_disable_vf(). This resolves a panic encountered when the\ninterface is disabled and then later brought up again after PF\ncommunication is restored.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
          "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47201",
          "url": "https://www.suse.com/security/cve/CVE-2021-47201"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222792 for CVE-2021-47201",
          "url": "https://bugzilla.suse.com/1222792"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:30:56Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47201"
    },
    {
      "cve": "CVE-2021-47202",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47202"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nthermal: Fix NULL pointer dereferences in of_thermal_ functions\n\nof_parse_thermal_zones() parses the thermal-zones node and registers a\nthermal_zone device for each subnode. However, if a thermal zone is\nconsuming a thermal sensor and that thermal sensor device hasn\u0027t probed\nyet, an attempt to set trip_point_*_temp for that thermal zone device\ncan cause a NULL pointer dereference. Fix it.\n\n console:/sys/class/thermal/thermal_zone87 # echo 120000 \u003e trip_point_0_temp\n ...\n Unable to handle kernel NULL pointer dereference at virtual address 0000000000000020\n ...\n Call trace:\n  of_thermal_set_trip_temp+0x40/0xc4\n  trip_point_temp_store+0xc0/0x1dc\n  dev_attr_store+0x38/0x88\n  sysfs_kf_write+0x64/0xc0\n  kernfs_fop_write_iter+0x108/0x1d0\n  vfs_write+0x2f4/0x368\n  ksys_write+0x7c/0xec\n  __arm64_sys_write+0x20/0x30\n  el0_svc_common.llvm.7279915941325364641+0xbc/0x1bc\n  do_el0_svc+0x28/0xa0\n  el0_svc+0x14/0x24\n  el0_sync_handler+0x88/0xec\n  el0_sync+0x1c0/0x200\n\nWhile at it, fix the possible NULL pointer dereference in other\nfunctions as well: of_thermal_get_temp(), of_thermal_set_emul_temp(),\nof_thermal_get_trend().",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
          "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47202",
          "url": "https://www.suse.com/security/cve/CVE-2021-47202"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222878 for CVE-2021-47202",
          "url": "https://bugzilla.suse.com/1222878"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:30:56Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47202"
    },
    {
      "cve": "CVE-2021-47203",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47203"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: lpfc: Fix list_add() corruption in lpfc_drain_txq()\n\nWhen parsing the txq list in lpfc_drain_txq(), the driver attempts to pass\nthe requests to the adapter. If such an attempt fails, a local \"fail_msg\"\nstring is set and a log message output.  The job is then added to a\ncompletions list for cancellation.\n\nProcessing of any further jobs from the txq list continues, but since\n\"fail_msg\" remains set, jobs are added to the completions list regardless\nof whether a wqe was passed to the adapter.  If successfully added to\ntxcmplq, jobs are added to both lists resulting in list corruption.\n\nFix by clearing the fail_msg string after adding a job to the completions\nlist. This stops the subsequent jobs from being added to the completions\nlist unless they had an appropriate failure.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
          "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47203",
          "url": "https://www.suse.com/security/cve/CVE-2021-47203"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222881 for CVE-2021-47203",
          "url": "https://bugzilla.suse.com/1222881"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:30:56Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47203"
    },
    {
      "cve": "CVE-2021-47204",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47204"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: dpaa2-eth: fix use-after-free in dpaa2_eth_remove\n\nAccess to netdev after free_netdev() will cause use-after-free bug.\nMove debug log before free_netdev() call to avoid it.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
          "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47204",
          "url": "https://www.suse.com/security/cve/CVE-2021-47204"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222787 for CVE-2021-47204",
          "url": "https://bugzilla.suse.com/1222787"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:30:56Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47204"
    },
    {
      "cve": "CVE-2021-47205",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47205"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nclk: sunxi-ng: Unregister clocks/resets when unbinding\n\nCurrently, unbinding a CCU driver unmaps the device\u0027s MMIO region, while\nleaving its clocks/resets and their providers registered. This can cause\na page fault later when some clock operation tries to perform MMIO. Fix\nthis by separating the CCU initialization from the memory allocation,\nand then using a devres callback to unregister the clocks and resets.\n\nThis also fixes a memory leak of the `struct ccu_reset`, and uses the\ncorrect owner (the specific platform driver) for the clocks and resets.\n\nEarly OF clock providers are never unregistered, and limited error\nhandling is possible, so they are mostly unchanged. The error reporting\nis made more consistent by moving the message inside of_sunxi_ccu_probe.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
          "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47205",
          "url": "https://www.suse.com/security/cve/CVE-2021-47205"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222888 for CVE-2021-47205",
          "url": "https://bugzilla.suse.com/1222888"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:30:56Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47205"
    },
    {
      "cve": "CVE-2021-47206",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47206"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: host: ohci-tmio: check return value after calling platform_get_resource()\n\nIt will cause null-ptr-deref if platform_get_resource() returns NULL,\nwe need check the return value.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
          "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47206",
          "url": "https://www.suse.com/security/cve/CVE-2021-47206"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222894 for CVE-2021-47206",
          "url": "https://bugzilla.suse.com/1222894"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:30:56Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47206"
    },
    {
      "cve": "CVE-2021-47207",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47207"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: gus: fix null pointer dereference on pointer block\n\nThe pointer block return from snd_gf1_dma_next_block could be\nnull, so there is a potential null pointer dereference issue.\nFix this by adding a null check before dereference.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
          "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47207",
          "url": "https://www.suse.com/security/cve/CVE-2021-47207"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222790 for CVE-2021-47207",
          "url": "https://bugzilla.suse.com/1222790"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:30:56Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47207"
    },
    {
      "cve": "CVE-2021-47209",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47209"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsched/fair: Prevent dead task groups from regaining cfs_rq\u0027s\n\nKevin is reporting crashes which point to a use-after-free of a cfs_rq\nin update_blocked_averages(). Initial debugging revealed that we\u0027ve\nlive cfs_rq\u0027s (on_list=1) in an about to be kfree()\u0027d task group in\nfree_fair_sched_group(). However, it was unclear how that can happen.\n\nHis kernel config happened to lead to a layout of struct sched_entity\nthat put the \u0027my_q\u0027 member directly into the middle of the object\nwhich makes it incidentally overlap with SLUB\u0027s freelist pointer.\nThat, in combination with SLAB_FREELIST_HARDENED\u0027s freelist pointer\nmangling, leads to a reliable access violation in form of a #GP which\nmade the UAF fail fast.\n\nMichal seems to have run into the same issue[1]. He already correctly\ndiagnosed that commit a7b359fc6a37 (\"sched/fair: Correctly insert\ncfs_rq\u0027s to list on unthrottle\") is causing the preconditions for the\nUAF to happen by re-adding cfs_rq\u0027s also to task groups that have no\nmore running tasks, i.e. also to dead ones. His analysis, however,\nmisses the real root cause and it cannot be seen from the crash\nbacktrace only, as the real offender is tg_unthrottle_up() getting\ncalled via sched_cfs_period_timer() via the timer interrupt at an\ninconvenient time.\n\nWhen unregister_fair_sched_group() unlinks all cfs_rq\u0027s from the dying\ntask group, it doesn\u0027t protect itself from getting interrupted. If the\ntimer interrupt triggers while we iterate over all CPUs or after\nunregister_fair_sched_group() has finished but prior to unlinking the\ntask group, sched_cfs_period_timer() will execute and walk the list of\ntask groups, trying to unthrottle cfs_rq\u0027s, i.e. re-add them to the\ndying task group. These will later -- in free_fair_sched_group() -- be\nkfree()\u0027ed while still being linked, leading to the fireworks Kevin\nand Michal are seeing.\n\nTo fix this race, ensure the dying task group gets unlinked first.\nHowever, simply switching the order of unregistering and unlinking the\ntask group isn\u0027t sufficient, as concurrent RCU walkers might still see\nit, as can be seen below:\n\n    CPU1:                                      CPU2:\n      :                                        timer IRQ:\n      :                                          do_sched_cfs_period_timer():\n      :                                            :\n      :                                            distribute_cfs_runtime():\n      :                                              rcu_read_lock();\n      :                                              :\n      :                                              unthrottle_cfs_rq():\n    sched_offline_group():                             :\n      :                                                walk_tg_tree_from(\u2026,tg_unthrottle_up,\u2026):\n      list_del_rcu(\u0026tg-\u003elist);                           :\n (1)  :                                                  list_for_each_entry_rcu(child, \u0026parent-\u003echildren, siblings)\n      :                                                    :\n (2)  list_del_rcu(\u0026tg-\u003esiblings);                         :\n      :                                                    tg_unthrottle_up():\n      unregister_fair_sched_group():                         struct cfs_rq *cfs_rq = tg-\u003ecfs_rq[cpu_of(rq)];\n        :                                                    :\n        list_del_leaf_cfs_rq(tg-\u003ecfs_rq[cpu]);               :\n        :                                                    :\n        :                                                    if (!cfs_rq_is_decayed(cfs_rq) || cfs_rq-\u003enr_running)\n (3)    :                                                        list_add_leaf_cfs_rq(cfs_rq);\n      :                                                      :\n      :                                                    :\n      :                                                  :\n      :                                                :\n      :                           \n---truncated---",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
          "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47209",
          "url": "https://www.suse.com/security/cve/CVE-2021-47209"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222796 for CVE-2021-47209",
          "url": "https://bugzilla.suse.com/1222796"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:30:56Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47209"
    },
    {
      "cve": "CVE-2021-47210",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47210"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: typec: tipd: Remove WARN_ON in tps6598x_block_read\n\nCalling tps6598x_block_read with a higher than allowed len can be\nhandled by just returning an error. There\u0027s no need to crash systems\nwith panic-on-warn enabled.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
          "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47210",
          "url": "https://www.suse.com/security/cve/CVE-2021-47210"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222901 for CVE-2021-47210",
          "url": "https://bugzilla.suse.com/1222901"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:30:56Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47210"
    },
    {
      "cve": "CVE-2021-47211",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47211"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: usb-audio: fix null pointer dereference on pointer cs_desc\n\nThe pointer cs_desc return from snd_usb_find_clock_source could\nbe null, so there is a potential null pointer dereference issue.\nFix this by adding a null check before dereference.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
          "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47211",
          "url": "https://www.suse.com/security/cve/CVE-2021-47211"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222869 for CVE-2021-47211",
          "url": "https://bugzilla.suse.com/1222869"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:30:56Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47211"
    },
    {
      "cve": "CVE-2021-47212",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47212"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/mlx5: Update error handler for UCTX and UMEM\n\nIn the fast unload flow, the device state is set to internal error,\nwhich indicates that the driver started the destroy process.\nIn this case, when a destroy command is being executed, it should return\nMLX5_CMD_STAT_OK.\nFix MLX5_CMD_OP_DESTROY_UCTX and MLX5_CMD_OP_DESTROY_UMEM to return OK\ninstead of EIO.\n\nThis fixes a call trace in the umem release process -\n[ 2633.536695] Call Trace:\n[ 2633.537518]  ib_uverbs_remove_one+0xc3/0x140 [ib_uverbs]\n[ 2633.538596]  remove_client_context+0x8b/0xd0 [ib_core]\n[ 2633.539641]  disable_device+0x8c/0x130 [ib_core]\n[ 2633.540615]  __ib_unregister_device+0x35/0xa0 [ib_core]\n[ 2633.541640]  ib_unregister_device+0x21/0x30 [ib_core]\n[ 2633.542663]  __mlx5_ib_remove+0x38/0x90 [mlx5_ib]\n[ 2633.543640]  auxiliary_bus_remove+0x1e/0x30 [auxiliary]\n[ 2633.544661]  device_release_driver_internal+0x103/0x1f0\n[ 2633.545679]  bus_remove_device+0xf7/0x170\n[ 2633.546640]  device_del+0x181/0x410\n[ 2633.547606]  mlx5_rescan_drivers_locked.part.10+0x63/0x160 [mlx5_core]\n[ 2633.548777]  mlx5_unregister_device+0x27/0x40 [mlx5_core]\n[ 2633.549841]  mlx5_uninit_one+0x21/0xc0 [mlx5_core]\n[ 2633.550864]  remove_one+0x69/0xe0 [mlx5_core]\n[ 2633.551819]  pci_device_remove+0x3b/0xc0\n[ 2633.552731]  device_release_driver_internal+0x103/0x1f0\n[ 2633.553746]  unbind_store+0xf6/0x130\n[ 2633.554657]  kernfs_fop_write+0x116/0x190\n[ 2633.555567]  vfs_write+0xa5/0x1a0\n[ 2633.556407]  ksys_write+0x4f/0xb0\n[ 2633.557233]  do_syscall_64+0x5b/0x1a0\n[ 2633.558071]  entry_SYSCALL_64_after_hwframe+0x65/0xca\n[ 2633.559018] RIP: 0033:0x7f9977132648\n[ 2633.559821] Code: 89 02 48 c7 c0 ff ff ff ff eb b3 0f 1f 80 00 00 00 00 f3 0f 1e fa 48 8d 05 55 6f 2d 00 8b 00 85 c0 75 17 b8 01 00 00 00 0f 05 \u003c48\u003e 3d 00 f0 ff ff 77 58 c3 0f 1f 80 00 00 00 00 41 54 49 89 d4 55\n[ 2633.562332] RSP: 002b:00007fffb1a83888 EFLAGS: 00000246 ORIG_RAX: 0000000000000001\n[ 2633.563472] RAX: ffffffffffffffda RBX: 000000000000000c RCX: 00007f9977132648\n[ 2633.564541] RDX: 000000000000000c RSI: 000055b90546e230 RDI: 0000000000000001\n[ 2633.565596] RBP: 000055b90546e230 R08: 00007f9977406860 R09: 00007f9977a54740\n[ 2633.566653] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f99774056e0\n[ 2633.567692] R13: 000000000000000c R14: 00007f9977400880 R15: 000000000000000c\n[ 2633.568725] ---[ end trace 10b4fe52945e544d ]---",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
          "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47212",
          "url": "https://www.suse.com/security/cve/CVE-2021-47212"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222709 for CVE-2021-47212",
          "url": "https://bugzilla.suse.com/1222709"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:30:56Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47212"
    },
    {
      "cve": "CVE-2021-47215",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47215"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/mlx5e: kTLS, Fix crash in RX resync flow\n\nFor the TLS RX resync flow, we maintain a list of TLS contexts\nthat require some attention, to communicate their resync information\nto the HW.\nHere we fix list corruptions, by protecting the entries against\nmovements coming from resync_handle_seq_match(), until their resync\nhandling in napi is fully completed.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
          "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47215",
          "url": "https://www.suse.com/security/cve/CVE-2021-47215"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222704 for CVE-2021-47215",
          "url": "https://bugzilla.suse.com/1222704"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:30:56Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47215"
    },
    {
      "cve": "CVE-2021-47216",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47216"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: advansys: Fix kernel pointer leak\n\nPointers should be printed with %p or %px rather than cast to \u0027unsigned\nlong\u0027 and printed with %lx.\n\nChange %lx to %p to print the hashed pointer.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
          "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47216",
          "url": "https://www.suse.com/security/cve/CVE-2021-47216"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222876 for CVE-2021-47216",
          "url": "https://bugzilla.suse.com/1222876"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:30:56Z",
          "details": "low"
        }
      ],
      "title": "CVE-2021-47216"
    },
    {
      "cve": "CVE-2021-47217",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47217"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nx86/hyperv: Fix NULL deref in set_hv_tscchange_cb() if Hyper-V setup fails\n\nCheck for a valid hv_vp_index array prior to derefencing hv_vp_index when\nsetting Hyper-V\u0027s TSC change callback.  If Hyper-V setup failed in\nhyperv_init(), the kernel will still report that it\u0027s running under\nHyper-V, but will have silently disabled nearly all functionality.\n\n  BUG: kernel NULL pointer dereference, address: 0000000000000010\n  #PF: supervisor read access in kernel mode\n  #PF: error_code(0x0000) - not-present page\n  PGD 0 P4D 0\n  Oops: 0000 [#1] SMP\n  CPU: 4 PID: 1 Comm: swapper/0 Not tainted 5.15.0-rc2+ #75\n  Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 0.0.0 02/06/2015\n  RIP: 0010:set_hv_tscchange_cb+0x15/0xa0\n  Code: \u003c8b\u003e 04 82 8b 15 12 17 85 01 48 c1 e0 20 48 0d ee 00 01 00 f6 c6 08\n  ...\n  Call Trace:\n   kvm_arch_init+0x17c/0x280\n   kvm_init+0x31/0x330\n   vmx_init+0xba/0x13a\n   do_one_initcall+0x41/0x1c0\n   kernel_init_freeable+0x1f2/0x23b\n   kernel_init+0x16/0x120\n   ret_from_fork+0x22/0x30",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
          "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47217",
          "url": "https://www.suse.com/security/cve/CVE-2021-47217"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222836 for CVE-2021-47217",
          "url": "https://bugzilla.suse.com/1222836"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:30:56Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47217"
    },
    {
      "cve": "CVE-2021-47218",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47218"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nselinux: fix NULL-pointer dereference when hashtab allocation fails\n\nWhen the hash table slot array allocation fails in hashtab_init(),\nh-\u003esize is left initialized with a non-zero value, but the h-\u003ehtable\npointer is NULL. This may then cause a NULL pointer dereference, since\nthe policydb code relies on the assumption that even after a failed\nhashtab_init(), hashtab_map() and hashtab_destroy() can be safely called\non it. Yet, these detect an empty hashtab only by looking at the size.\n\nFix this by making sure that hashtab_init() always leaves behind a valid\nempty hashtab when the allocation fails.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
          "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47218",
          "url": "https://www.suse.com/security/cve/CVE-2021-47218"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222791 for CVE-2021-47218",
          "url": "https://bugzilla.suse.com/1222791"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:30:56Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47218"
    },
    {
      "cve": "CVE-2021-47219",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47219"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: scsi_debug: Fix out-of-bound read in resp_report_tgtpgs()\n\nThe following issue was observed running syzkaller:\n\nBUG: KASAN: slab-out-of-bounds in memcpy include/linux/string.h:377 [inline]\nBUG: KASAN: slab-out-of-bounds in sg_copy_buffer+0x150/0x1c0 lib/scatterlist.c:831\nRead of size 2132 at addr ffff8880aea95dc8 by task syz-executor.0/9815\n\nCPU: 0 PID: 9815 Comm: syz-executor.0 Not tainted 4.19.202-00874-gfc0fe04215a9 #2\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.10.2-1ubuntu1 04/01/2014\nCall Trace:\n __dump_stack lib/dump_stack.c:77 [inline]\n dump_stack+0xe4/0x14a lib/dump_stack.c:118\n print_address_description+0x73/0x280 mm/kasan/report.c:253\n kasan_report_error mm/kasan/report.c:352 [inline]\n kasan_report+0x272/0x370 mm/kasan/report.c:410\n memcpy+0x1f/0x50 mm/kasan/kasan.c:302\n memcpy include/linux/string.h:377 [inline]\n sg_copy_buffer+0x150/0x1c0 lib/scatterlist.c:831\n fill_from_dev_buffer+0x14f/0x340 drivers/scsi/scsi_debug.c:1021\n resp_report_tgtpgs+0x5aa/0x770 drivers/scsi/scsi_debug.c:1772\n schedule_resp+0x464/0x12f0 drivers/scsi/scsi_debug.c:4429\n scsi_debug_queuecommand+0x467/0x1390 drivers/scsi/scsi_debug.c:5835\n scsi_dispatch_cmd+0x3fc/0x9b0 drivers/scsi/scsi_lib.c:1896\n scsi_request_fn+0x1042/0x1810 drivers/scsi/scsi_lib.c:2034\n __blk_run_queue_uncond block/blk-core.c:464 [inline]\n __blk_run_queue+0x1a4/0x380 block/blk-core.c:484\n blk_execute_rq_nowait+0x1c2/0x2d0 block/blk-exec.c:78\n sg_common_write.isra.19+0xd74/0x1dc0 drivers/scsi/sg.c:847\n sg_write.part.23+0x6e0/0xd00 drivers/scsi/sg.c:716\n sg_write+0x64/0xa0 drivers/scsi/sg.c:622\n __vfs_write+0xed/0x690 fs/read_write.c:485\nkill_bdev:block_device:00000000e138492c\n vfs_write+0x184/0x4c0 fs/read_write.c:549\n ksys_write+0x107/0x240 fs/read_write.c:599\n do_syscall_64+0xc2/0x560 arch/x86/entry/common.c:293\n entry_SYSCALL_64_after_hwframe+0x49/0xbe\n\nWe get \u0027alen\u0027 from command its type is int. If userspace passes a large\nlength we will get a negative \u0027alen\u0027.\n\nSwitch n, alen, and rlen to u32.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
          "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47219",
          "url": "https://www.suse.com/security/cve/CVE-2021-47219"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222824 for CVE-2021-47219",
          "url": "https://bugzilla.suse.com/1222824"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:30:56Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47219"
    },
    {
      "cve": "CVE-2022-48631",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-48631"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\next4: fix bug in extents parsing when eh_entries == 0 and eh_depth \u003e 0\n\nWhen walking through an inode extents, the ext4_ext_binsearch_idx() function\nassumes that the extent header has been previously validated.  However, there\nare no checks that verify that the number of entries (eh-\u003eeh_entries) is\nnon-zero when depth is \u003e 0.  And this will lead to problems because the\nEXT_FIRST_INDEX() and EXT_LAST_INDEX() will return garbage and result in this:\n\n[  135.245946] ------------[ cut here ]------------\n[  135.247579] kernel BUG at fs/ext4/extents.c:2258!\n[  135.249045] invalid opcode: 0000 [#1] PREEMPT SMP\n[  135.250320] CPU: 2 PID: 238 Comm: tmp118 Not tainted 5.19.0-rc8+ #4\n[  135.252067] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.15.0-0-g2dd4b9b-rebuilt.opensuse.org 04/01/2014\n[  135.255065] RIP: 0010:ext4_ext_map_blocks+0xc20/0xcb0\n[  135.256475] Code:\n[  135.261433] RSP: 0018:ffffc900005939f8 EFLAGS: 00010246\n[  135.262847] RAX: 0000000000000024 RBX: ffffc90000593b70 RCX: 0000000000000023\n[  135.264765] RDX: ffff8880038e5f10 RSI: 0000000000000003 RDI: ffff8880046e922c\n[  135.266670] RBP: ffff8880046e9348 R08: 0000000000000001 R09: ffff888002ca580c\n[  135.268576] R10: 0000000000002602 R11: 0000000000000000 R12: 0000000000000024\n[  135.270477] R13: 0000000000000000 R14: 0000000000000024 R15: 0000000000000000\n[  135.272394] FS:  00007fdabdc56740(0000) GS:ffff88807dd00000(0000) knlGS:0000000000000000\n[  135.274510] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[  135.276075] CR2: 00007ffc26bd4f00 CR3: 0000000006261004 CR4: 0000000000170ea0\n[  135.277952] Call Trace:\n[  135.278635]  \u003cTASK\u003e\n[  135.279247]  ? preempt_count_add+0x6d/0xa0\n[  135.280358]  ? percpu_counter_add_batch+0x55/0xb0\n[  135.281612]  ? _raw_read_unlock+0x18/0x30\n[  135.282704]  ext4_map_blocks+0x294/0x5a0\n[  135.283745]  ? xa_load+0x6f/0xa0\n[  135.284562]  ext4_mpage_readpages+0x3d6/0x770\n[  135.285646]  read_pages+0x67/0x1d0\n[  135.286492]  ? folio_add_lru+0x51/0x80\n[  135.287441]  page_cache_ra_unbounded+0x124/0x170\n[  135.288510]  filemap_get_pages+0x23d/0x5a0\n[  135.289457]  ? path_openat+0xa72/0xdd0\n[  135.290332]  filemap_read+0xbf/0x300\n[  135.291158]  ? _raw_spin_lock_irqsave+0x17/0x40\n[  135.292192]  new_sync_read+0x103/0x170\n[  135.293014]  vfs_read+0x15d/0x180\n[  135.293745]  ksys_read+0xa1/0xe0\n[  135.294461]  do_syscall_64+0x3c/0x80\n[  135.295284]  entry_SYSCALL_64_after_hwframe+0x46/0xb0\n\nThis patch simply adds an extra check in __ext4_ext_check(), verifying that\neh_entries is not 0 when eh_depth is \u003e 0.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
          "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-48631",
          "url": "https://www.suse.com/security/cve/CVE-2022-48631"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223475 for CVE-2022-48631",
          "url": "https://bugzilla.suse.com/1223475"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:30:56Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-48631"
    },
    {
      "cve": "CVE-2022-48637",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-48637"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbnxt: prevent skb UAF after handing over to PTP worker\n\nWhen reading the timestamp is required bnxt_tx_int() hands\nover the ownership of the completed skb to the PTP worker.\nThe skb should not be used afterwards, as the worker may\nrun before the rest of our code and free the skb, leading\nto a use-after-free.\n\nSince dev_kfree_skb_any() accepts NULL make the loss of\nownership more obvious and set skb to NULL.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
          "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-48637",
          "url": "https://www.suse.com/security/cve/CVE-2022-48637"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223517 for CVE-2022-48637",
          "url": "https://bugzilla.suse.com/1223517"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:30:56Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-48637"
    },
    {
      "cve": "CVE-2022-48638",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-48638"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncgroup: cgroup_get_from_id() must check the looked-up kn is a directory\n\ncgroup has to be one kernfs dir, otherwise kernel panic is caused,\nespecially cgroup id is provide from userspace.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
          "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-48638",
          "url": "https://www.suse.com/security/cve/CVE-2022-48638"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223522 for CVE-2022-48638",
          "url": "https://bugzilla.suse.com/1223522"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:30:56Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-48638"
    },
    {
      "cve": "CVE-2022-48647",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-48647"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsfc: fix TX channel offset when using legacy interrupts\n\nIn legacy interrupt mode the tx_channel_offset was hardcoded to 1, but\nthat\u0027s not correct if efx_sepparate_tx_channels is false. In that case,\nthe offset is 0 because the tx queues are in the single existing channel\nat index 0, together with the rx queue.\n\nWithout this fix, as soon as you try to send any traffic, it tries to\nget the tx queues from an uninitialized channel getting these errors:\n  WARNING: CPU: 1 PID: 0 at drivers/net/ethernet/sfc/tx.c:540 efx_hard_start_xmit+0x12e/0x170 [sfc]\n  [...]\n  RIP: 0010:efx_hard_start_xmit+0x12e/0x170 [sfc]\n  [...]\n  Call Trace:\n   \u003cIRQ\u003e\n   dev_hard_start_xmit+0xd7/0x230\n   sch_direct_xmit+0x9f/0x360\n   __dev_queue_xmit+0x890/0xa40\n  [...]\n  BUG: unable to handle kernel NULL pointer dereference at 0000000000000020\n  [...]\n  RIP: 0010:efx_hard_start_xmit+0x153/0x170 [sfc]\n  [...]\n  Call Trace:\n   \u003cIRQ\u003e\n   dev_hard_start_xmit+0xd7/0x230\n   sch_direct_xmit+0x9f/0x360\n   __dev_queue_xmit+0x890/0xa40\n  [...]",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
          "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-48647",
          "url": "https://www.suse.com/security/cve/CVE-2022-48647"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223519 for CVE-2022-48647",
          "url": "https://bugzilla.suse.com/1223519"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:30:56Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-48647"
    },
    {
      "cve": "CVE-2022-48648",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-48648"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsfc: fix null pointer dereference in efx_hard_start_xmit\n\nTrying to get the channel from the tx_queue variable here is wrong\nbecause we can only be here if tx_queue is NULL, so we shouldn\u0027t\ndereference it. As the above comment in the code says, this is very\nunlikely to happen, but it\u0027s wrong anyway so let\u0027s fix it.\n\nI hit this issue because of a different bug that caused tx_queue to be\nNULL. If that happens, this is the error message that we get here:\n  BUG: unable to handle kernel NULL pointer dereference at 0000000000000020\n  [...]\n  RIP: 0010:efx_hard_start_xmit+0x153/0x170 [sfc]",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
          "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-48648",
          "url": "https://www.suse.com/security/cve/CVE-2022-48648"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223503 for CVE-2022-48648",
          "url": "https://bugzilla.suse.com/1223503"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:30:56Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-48648"
    },
    {
      "cve": "CVE-2022-48650",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-48650"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: qla2xxx: Fix memory leak in __qlt_24xx_handle_abts()\n\nCommit 8f394da36a36 (\"scsi: qla2xxx: Drop TARGET_SCF_LOOKUP_LUN_FROM_TAG\")\nmade the __qlt_24xx_handle_abts() function return early if\ntcm_qla2xxx_find_cmd_by_tag() didn\u0027t find a command, but it missed to clean\nup the allocated memory for the management command.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
          "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-48650",
          "url": "https://www.suse.com/security/cve/CVE-2022-48650"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223509 for CVE-2022-48650",
          "url": "https://bugzilla.suse.com/1223509"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:30:56Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-48650"
    },
    {
      "cve": "CVE-2022-48651",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-48651"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipvlan: Fix out-of-bound bugs caused by unset skb-\u003emac_header\n\nIf an AF_PACKET socket is used to send packets through ipvlan and the\ndefault xmit function of the AF_PACKET socket is changed from\ndev_queue_xmit() to packet_direct_xmit() via setsockopt() with the option\nname of PACKET_QDISC_BYPASS, the skb-\u003emac_header may not be reset and\nremains as the initial value of 65535, this may trigger slab-out-of-bounds\nbugs as following:\n\n=================================================================\nUG: KASAN: slab-out-of-bounds in ipvlan_xmit_mode_l2+0xdb/0x330 [ipvlan]\nPU: 2 PID: 1768 Comm: raw_send Kdump: loaded Not tainted 6.0.0-rc4+ #6\nardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.14.0-1.fc33\nall Trace:\nprint_address_description.constprop.0+0x1d/0x160\nprint_report.cold+0x4f/0x112\nkasan_report+0xa3/0x130\nipvlan_xmit_mode_l2+0xdb/0x330 [ipvlan]\nipvlan_start_xmit+0x29/0xa0 [ipvlan]\n__dev_direct_xmit+0x2e2/0x380\npacket_direct_xmit+0x22/0x60\npacket_snd+0x7c9/0xc40\nsock_sendmsg+0x9a/0xa0\n__sys_sendto+0x18a/0x230\n__x64_sys_sendto+0x74/0x90\ndo_syscall_64+0x3b/0x90\nentry_SYSCALL_64_after_hwframe+0x63/0xcd\n\nThe root cause is:\n  1. packet_snd() only reset skb-\u003emac_header when sock-\u003etype is SOCK_RAW\n     and skb-\u003eprotocol is not specified as in packet_parse_headers()\n\n  2. packet_direct_xmit() doesn\u0027t reset skb-\u003emac_header as dev_queue_xmit()\n\nIn this case, skb-\u003emac_header is 65535 when ipvlan_xmit_mode_l2() is\ncalled. So when ipvlan_xmit_mode_l2() gets mac header with eth_hdr() which\nuse \"skb-\u003ehead + skb-\u003emac_header\", out-of-bound access occurs.\n\nThis patch replaces eth_hdr() with skb_eth_hdr() in ipvlan_xmit_mode_l2()\nand reset mac header in multicast to solve this out-of-bound bug.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
          "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-48651",
          "url": "https://www.suse.com/security/cve/CVE-2022-48651"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223513 for CVE-2022-48651",
          "url": "https://bugzilla.suse.com/1223513"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223514 for CVE-2022-48651",
          "url": "https://bugzilla.suse.com/1223514"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:30:56Z",
          "details": "important"
        }
      ],
      "title": "CVE-2022-48651"
    },
    {
      "cve": "CVE-2022-48653",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-48653"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nice: Don\u0027t double unplug aux on peer initiated reset\n\nIn the IDC callback that is accessed when the aux drivers request a reset,\nthe function to unplug the aux devices is called.  This function is also\ncalled in the ice_prepare_for_reset function. This double call is causing\na \"scheduling while atomic\" BUG.\n\n[  662.676430] ice 0000:4c:00.0 rocep76s0: cqp opcode = 0x1 maj_err_code = 0xffff min_err_code = 0x8003\n\n[  662.676609] ice 0000:4c:00.0 rocep76s0: [Modify QP Cmd Error][op_code=8] status=-29 waiting=1 completion_err=1 maj=0xffff min=0x8003\n\n[  662.815006] ice 0000:4c:00.0 rocep76s0: ICE OICR event notification: oicr = 0x10000003\n\n[  662.815014] ice 0000:4c:00.0 rocep76s0: critical PE Error, GLPE_CRITERR=0x00011424\n\n[  662.815017] ice 0000:4c:00.0 rocep76s0: Requesting a reset\n\n[  662.815475] BUG: scheduling while atomic: swapper/37/0/0x00010002\n\n[  662.815475] BUG: scheduling while atomic: swapper/37/0/0x00010002\n[  662.815477] Modules linked in: rpcsec_gss_krb5 auth_rpcgss nfsv4 dns_resolver nfs lockd grace fscache netfs rfkill 8021q garp mrp stp llc vfat fat rpcrdma intel_rapl_msr intel_rapl_common sunrpc i10nm_edac rdma_ucm nfit ib_srpt libnvdimm ib_isert iscsi_target_mod x86_pkg_temp_thermal intel_powerclamp coretemp target_core_mod snd_hda_intel ib_iser snd_intel_dspcfg libiscsi snd_intel_sdw_acpi scsi_transport_iscsi kvm_intel iTCO_wdt rdma_cm snd_hda_codec kvm iw_cm ipmi_ssif iTCO_vendor_support snd_hda_core irqbypass crct10dif_pclmul crc32_pclmul ghash_clmulni_intel snd_hwdep snd_seq snd_seq_device rapl snd_pcm snd_timer isst_if_mbox_pci pcspkr isst_if_mmio irdma intel_uncore idxd acpi_ipmi joydev isst_if_common snd mei_me idxd_bus ipmi_si soundcore i2c_i801 mei ipmi_devintf i2c_smbus i2c_ismt ipmi_msghandler acpi_power_meter acpi_pad rv(OE) ib_uverbs ib_cm ib_core xfs libcrc32c ast i2c_algo_bit drm_vram_helper drm_kms_helper syscopyarea sysfillrect sysimgblt fb_sys_fops drm_ttm_helpe\n r ttm\n[  662.815546]  nvme nvme_core ice drm crc32c_intel i40e t10_pi wmi pinctrl_emmitsburg dm_mirror dm_region_hash dm_log dm_mod fuse\n[  662.815557] Preemption disabled at:\n[  662.815558] [\u003c0000000000000000\u003e] 0x0\n[  662.815563] CPU: 37 PID: 0 Comm: swapper/37 Kdump: loaded Tainted: G S         OE     5.17.1 #2\n[  662.815566] Hardware name: Intel Corporation D50DNP/D50DNP, BIOS SE5C6301.86B.6624.D18.2111021741 11/02/2021\n[  662.815568] Call Trace:\n[  662.815572]  \u003cIRQ\u003e\n[  662.815574]  dump_stack_lvl+0x33/0x42\n[  662.815581]  __schedule_bug.cold.147+0x7d/0x8a\n[  662.815588]  __schedule+0x798/0x990\n[  662.815595]  schedule+0x44/0xc0\n[  662.815597]  schedule_preempt_disabled+0x14/0x20\n[  662.815600]  __mutex_lock.isra.11+0x46c/0x490\n[  662.815603]  ? __ibdev_printk+0x76/0xc0 [ib_core]\n[  662.815633]  device_del+0x37/0x3d0\n[  662.815639]  ice_unplug_aux_dev+0x1a/0x40 [ice]\n[  662.815674]  ice_schedule_reset+0x3c/0xd0 [ice]\n[  662.815693]  irdma_iidc_event_handler.cold.7+0xb6/0xd3 [irdma]\n[  662.815712]  ? bitmap_find_next_zero_area_off+0x45/0xa0\n[  662.815719]  ice_send_event_to_aux+0x54/0x70 [ice]\n[  662.815741]  ice_misc_intr+0x21d/0x2d0 [ice]\n[  662.815756]  __handle_irq_event_percpu+0x4c/0x180\n[  662.815762]  handle_irq_event_percpu+0xf/0x40\n[  662.815764]  handle_irq_event+0x34/0x60\n[  662.815766]  handle_edge_irq+0x9a/0x1c0\n[  662.815770]  __common_interrupt+0x62/0x100\n[  662.815774]  common_interrupt+0xb4/0xd0\n[  662.815779]  \u003c/IRQ\u003e\n[  662.815780]  \u003cTASK\u003e\n[  662.815780]  asm_common_interrupt+0x1e/0x40\n[  662.815785] RIP: 0010:cpuidle_enter_state+0xd6/0x380\n[  662.815789] Code: 49 89 c4 0f 1f 44 00 00 31 ff e8 65 d7 95 ff 45 84 ff 74 12 9c 58 f6 c4 02 0f 85 64 02 00 00 31 ff e8 ae c5 9c ff fb 45 85 f6 \u003c0f\u003e 88 12 01 00 00 49 63 d6 4c 2b 24 24 48 8d 04 52 48 8d 04 82 49\n[  662.815791] RSP: 0018:ff2c2c4f18edbe80 EFLAGS: 00000202\n[  662.815793] RAX: ff280805df140000 RBX: 0000000000000002 RCX: 000000000000001f\n[  662.815795] RDX: 0000009a52da2d08 R\n---truncated---",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
          "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-48653",
          "url": "https://www.suse.com/security/cve/CVE-2022-48653"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223474 for CVE-2022-48653",
          "url": "https://bugzilla.suse.com/1223474"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:30:56Z",
          "details": "low"
        }
      ],
      "title": "CVE-2022-48653"
    },
    {
      "cve": "CVE-2022-48654",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-48654"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nfnetlink_osf: fix possible bogus match in nf_osf_find()\n\nnf_osf_find() incorrectly returns true on mismatch, this leads to\ncopying uninitialized memory area in nft_osf which can be used to leak\nstale kernel stack data to userspace.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
          "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-48654",
          "url": "https://www.suse.com/security/cve/CVE-2022-48654"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223482 for CVE-2022-48654",
          "url": "https://bugzilla.suse.com/1223482"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:30:56Z",
          "details": "low"
        }
      ],
      "title": "CVE-2022-48654"
    },
    {
      "cve": "CVE-2022-48655",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-48655"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfirmware: arm_scmi: Harden accesses to the reset domains\n\nAccessing reset domains descriptors by the index upon the SCMI drivers\nrequests through the SCMI reset operations interface can potentially\nlead to out-of-bound violations if the SCMI driver misbehave.\n\nAdd an internal consistency check before any such domains descriptors\naccesses.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
          "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-48655",
          "url": "https://www.suse.com/security/cve/CVE-2022-48655"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223477 for CVE-2022-48655",
          "url": "https://bugzilla.suse.com/1223477"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:30:56Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-48655"
    },
    {
      "cve": "CVE-2022-48656",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-48656"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndmaengine: ti: k3-udma-private: Fix refcount leak bug in of_xudma_dev_get()\n\nWe should call of_node_put() for the reference returned by\nof_parse_phandle() in fail path or when it is not used anymore.\nHere we only need to move the of_node_put() before the check.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
          "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-48656",
          "url": "https://www.suse.com/security/cve/CVE-2022-48656"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223479 for CVE-2022-48656",
          "url": "https://bugzilla.suse.com/1223479"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:30:56Z",
          "details": "low"
        }
      ],
      "title": "CVE-2022-48656"
    },
    {
      "cve": "CVE-2022-48657",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-48657"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\narm64: topology: fix possible overflow in amu_fie_setup()\n\ncpufreq_get_hw_max_freq() returns max frequency in kHz as *unsigned int*,\nwhile freq_inv_set_max_ratio() gets passed this frequency in Hz as \u0027u64\u0027.\nMultiplying max frequency by 1000 can potentially result in overflow --\nmultiplying by 1000ULL instead should avoid that...\n\nFound by Linux Verification Center (linuxtesting.org) with the SVACE static\nanalysis tool.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
          "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-48657",
          "url": "https://www.suse.com/security/cve/CVE-2022-48657"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223484 for CVE-2022-48657",
          "url": "https://bugzilla.suse.com/1223484"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:30:56Z",
          "details": "low"
        }
      ],
      "title": "CVE-2022-48657"
    },
    {
      "cve": "CVE-2022-48660",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-48660"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ngpiolib: cdev: Set lineevent_state::irq after IRQ register successfully\n\nWhen running gpio test on nxp-ls1028 platform with below command\ngpiomon --num-events=3 --rising-edge gpiochip1 25\nThere will be a warning trace as below:\nCall trace:\nfree_irq+0x204/0x360\nlineevent_free+0x64/0x70\ngpio_ioctl+0x598/0x6a0\n__arm64_sys_ioctl+0xb4/0x100\ninvoke_syscall+0x5c/0x130\n......\nel0t_64_sync+0x1a0/0x1a4\nThe reason of this issue is that calling request_threaded_irq()\nfunction failed, and then lineevent_free() is invoked to release\nthe resource. Since the lineevent_state::irq was already set, so\nthe subsequent invocation of free_irq() would trigger the above\nwarning call trace. To fix this issue, set the lineevent_state::irq\nafter the IRQ register successfully.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
          "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-48660",
          "url": "https://www.suse.com/security/cve/CVE-2022-48660"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223487 for CVE-2022-48660",
          "url": "https://bugzilla.suse.com/1223487"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:30:56Z",
          "details": "low"
        }
      ],
      "title": "CVE-2022-48660"
    },
    {
      "cve": "CVE-2022-48662",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-48662"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/i915/gem: Really move i915_gem_context.link under ref protection\n\ni915_perf assumes that it can use the i915_gem_context reference to\nprotect its i915-\u003egem.contexts.list iteration. However, this requires\nthat we do not remove the context from the list until after we drop the\nfinal reference and release the struct. If, as currently, we remove the\ncontext from the list during context_close(), the link.next pointer may\nbe poisoned while we are holding the context reference and cause a GPF:\n\n[ 4070.573157] i915 0000:00:02.0: [drm:i915_perf_open_ioctl [i915]] filtering on ctx_id=0x1fffff ctx_id_mask=0x1fffff\n[ 4070.574881] general protection fault, probably for non-canonical address 0xdead000000000100: 0000 [#1] PREEMPT SMP\n[ 4070.574897] CPU: 1 PID: 284392 Comm: amd_performance Tainted: G            E     5.17.9 #180\n[ 4070.574903] Hardware name: Intel Corporation NUC7i5BNK/NUC7i5BNB, BIOS BNKBL357.86A.0052.2017.0918.1346 09/18/2017\n[ 4070.574907] RIP: 0010:oa_configure_all_contexts.isra.0+0x222/0x350 [i915]\n[ 4070.574982] Code: 08 e8 32 6e 10 e1 4d 8b 6d 50 b8 ff ff ff ff 49 83 ed 50 f0 41 0f c1 04 24 83 f8 01 0f 84 e3 00 00 00 85 c0 0f 8e fa 00 00 00 \u003c49\u003e 8b 45 50 48 8d 70 b0 49 8d 45 50 48 39 44 24 10 0f 85 34 fe ff\n[ 4070.574990] RSP: 0018:ffffc90002077b78 EFLAGS: 00010202\n[ 4070.574995] RAX: 0000000000000002 RBX: 0000000000000002 RCX: 0000000000000000\n[ 4070.575000] RDX: 0000000000000001 RSI: ffffc90002077b20 RDI: ffff88810ddc7c68\n[ 4070.575004] RBP: 0000000000000001 R08: ffff888103242648 R09: fffffffffffffffc\n[ 4070.575008] R10: ffffffff82c50bc0 R11: 0000000000025c80 R12: ffff888101bf1860\n[ 4070.575012] R13: dead0000000000b0 R14: ffffc90002077c04 R15: ffff88810be5cabc\n[ 4070.575016] FS:  00007f1ed50c0780(0000) GS:ffff88885ec80000(0000) knlGS:0000000000000000\n[ 4070.575021] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[ 4070.575025] CR2: 00007f1ed5590280 CR3: 000000010ef6f005 CR4: 00000000003706e0\n[ 4070.575029] Call Trace:\n[ 4070.575033]  \u003cTASK\u003e\n[ 4070.575037]  lrc_configure_all_contexts+0x13e/0x150 [i915]\n[ 4070.575103]  gen8_enable_metric_set+0x4d/0x90 [i915]\n[ 4070.575164]  i915_perf_open_ioctl+0xbc0/0x1500 [i915]\n[ 4070.575224]  ? asm_common_interrupt+0x1e/0x40\n[ 4070.575232]  ? i915_oa_init_reg_state+0x110/0x110 [i915]\n[ 4070.575290]  drm_ioctl_kernel+0x85/0x110\n[ 4070.575296]  ? update_load_avg+0x5f/0x5e0\n[ 4070.575302]  drm_ioctl+0x1d3/0x370\n[ 4070.575307]  ? i915_oa_init_reg_state+0x110/0x110 [i915]\n[ 4070.575382]  ? gen8_gt_irq_handler+0x46/0x130 [i915]\n[ 4070.575445]  __x64_sys_ioctl+0x3c4/0x8d0\n[ 4070.575451]  ? __do_softirq+0xaa/0x1d2\n[ 4070.575456]  do_syscall_64+0x35/0x80\n[ 4070.575461]  entry_SYSCALL_64_after_hwframe+0x44/0xae\n[ 4070.575467] RIP: 0033:0x7f1ed5c10397\n[ 4070.575471] Code: 3c 1c e8 1c ff ff ff 85 c0 79 87 49 c7 c4 ff ff ff ff 5b 5d 4c 89 e0 41 5c c3 66 0f 1f 84 00 00 00 00 00 b8 10 00 00 00 0f 05 \u003c48\u003e 3d 01 f0 ff ff 73 01 c3 48 8b 0d a9 da 0d 00 f7 d8 64 89 01 48\n[ 4070.575478] RSP: 002b:00007ffd65c8d7a8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010\n[ 4070.575484] RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 00007f1ed5c10397\n[ 4070.575488] RDX: 00007ffd65c8d7c0 RSI: 0000000040106476 RDI: 0000000000000006\n[ 4070.575492] RBP: 00005620972f9c60 R08: 000000000000000a R09: 0000000000000005\n[ 4070.575496] R10: 000000000000000d R11: 0000000000000246 R12: 000000000000000a\n[ 4070.575500] R13: 000000000000000d R14: 0000000000000000 R15: 00007ffd65c8d7c0\n[ 4070.575505]  \u003c/TASK\u003e\n[ 4070.575507] Modules linked in: nls_ascii(E) nls_cp437(E) vfat(E) fat(E) i915(E) x86_pkg_temp_thermal(E) intel_powerclamp(E) crct10dif_pclmul(E) crc32_pclmul(E) crc32c_intel(E) aesni_intel(E) crypto_simd(E) intel_gtt(E) cryptd(E) ttm(E) rapl(E) intel_cstate(E) drm_kms_helper(E) cfbfillrect(E) syscopyarea(E) cfbimgblt(E) intel_uncore(E) sysfillrect(E) mei_me(E) sysimgblt(E) i2c_i801(E) fb_sys_fops(E) mei(E) intel_pch_thermal(E) i2c_smbus\n---truncated---",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
          "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-48662",
          "url": "https://www.suse.com/security/cve/CVE-2022-48662"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223505 for CVE-2022-48662",
          "url": "https://bugzilla.suse.com/1223505"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223521 for CVE-2022-48662",
          "url": "https://bugzilla.suse.com/1223521"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:30:56Z",
          "details": "important"
        }
      ],
      "title": "CVE-2022-48662"
    },
    {
      "cve": "CVE-2022-48663",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-48663"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ngpio: mockup: fix NULL pointer dereference when removing debugfs\n\nWe now remove the device\u0027s debugfs entries when unbinding the driver.\nThis now causes a NULL-pointer dereference on module exit because the\nplatform devices are unregistered *after* the global debugfs directory\nhas been recursively removed. Fix it by unregistering the devices first.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
          "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-48663",
          "url": "https://www.suse.com/security/cve/CVE-2022-48663"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223523 for CVE-2022-48663",
          "url": "https://bugzilla.suse.com/1223523"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:30:56Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-48663"
    },
    {
      "cve": "CVE-2022-48667",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-48667"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmb3: fix temporary data corruption in insert range\n\ninsert range doesn\u0027t discard the affected cached region\nso can risk temporarily corrupting file data.\n\nAlso includes some minor cleanup (avoiding rereading\ninode size repeatedly unnecessarily) to make it clearer.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
          "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-48667",
          "url": "https://www.suse.com/security/cve/CVE-2022-48667"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223518 for CVE-2022-48667",
          "url": "https://bugzilla.suse.com/1223518"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:30:56Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-48667"
    },
    {
      "cve": "CVE-2022-48668",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-48668"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmb3: fix temporary data corruption in collapse range\n\ncollapse range doesn\u0027t discard the affected cached region\nso can risk temporarily corrupting the file data. This\nfixes xfstest generic/031\n\nI also decided to merge a minor cleanup to this into the same patch\n(avoiding rereading inode size repeatedly unnecessarily) to make it\nclearer.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
          "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-48668",
          "url": "https://www.suse.com/security/cve/CVE-2022-48668"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223516 for CVE-2022-48668",
          "url": "https://bugzilla.suse.com/1223516"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:30:56Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-48668"
    },
    {
      "cve": "CVE-2023-0160",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-0160"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A deadlock flaw was found in the Linux kernel\u0027s BPF subsystem. This flaw allows a local user to potentially crash the system.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
          "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-0160",
          "url": "https://www.suse.com/security/cve/CVE-2023-0160"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1209657 for CVE-2023-0160",
          "url": "https://bugzilla.suse.com/1209657"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:30:56Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-0160"
    },
    {
      "cve": "CVE-2023-52476",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-52476"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nperf/x86/lbr: Filter vsyscall addresses\n\nWe found that a panic can occur when a vsyscall is made while LBR sampling\nis active. If the vsyscall is interrupted (NMI) for perf sampling, this\ncall sequence can occur (most recent at top):\n\n    __insn_get_emulate_prefix()\n    insn_get_emulate_prefix()\n    insn_get_prefixes()\n    insn_get_opcode()\n    decode_branch_type()\n    get_branch_type()\n    intel_pmu_lbr_filter()\n    intel_pmu_handle_irq()\n    perf_event_nmi_handler()\n\nWithin __insn_get_emulate_prefix() at frame 0, a macro is called:\n\n    peek_nbyte_next(insn_byte_t, insn, i)\n\nWithin this macro, this dereference occurs:\n\n    (insn)-\u003enext_byte\n\nInspecting registers at this point, the value of the next_byte field is the\naddress of the vsyscall made, for example the location of the vsyscall\nversion of gettimeofday() at 0xffffffffff600000. The access to an address\nin the vsyscall region will trigger an oops due to an unhandled page fault.\n\nTo fix the bug, filtering for vsyscalls can be done when\ndetermining the branch type. This patch will return\na \"none\" branch if a kernel address if found to lie in the\nvsyscall region.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
          "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-52476",
          "url": "https://www.suse.com/security/cve/CVE-2023-52476"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1220703 for CVE-2023-52476",
          "url": "https://bugzilla.suse.com/1220703"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:30:56Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-52476"
    },
    {
      "cve": "CVE-2023-52500",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-52500"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: pm80xx: Avoid leaking tags when processing OPC_INB_SET_CONTROLLER_CONFIG command\n\nTags allocated for OPC_INB_SET_CONTROLLER_CONFIG command need to be freed\nwhen we receive the response.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
          "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-52500",
          "url": "https://www.suse.com/security/cve/CVE-2023-52500"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1220883 for CVE-2023-52500",
          "url": "https://bugzilla.suse.com/1220883"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:30:56Z",
          "details": "low"
        }
      ],
      "title": "CVE-2023-52500"
    },
    {
      "cve": "CVE-2023-52590",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-52590"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nocfs2: Avoid touching renamed directory if parent does not change\n\nThe VFS will not be locking moved directory if its parent does not\nchange. Change ocfs2 rename code to avoid touching renamed directory if\nits parent does not change as without locking that can corrupt the\nfilesystem.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
          "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-52590",
          "url": "https://www.suse.com/security/cve/CVE-2023-52590"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1221088 for CVE-2023-52590",
          "url": "https://bugzilla.suse.com/1221088"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:30:56Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-52590"
    },
    {
      "cve": "CVE-2023-52591",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-52591"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nreiserfs: Avoid touching renamed directory if parent does not change\n\nThe VFS will not be locking moved directory if its parent does not\nchange. Change reiserfs rename code to avoid touching renamed directory\nif its parent does not change as without locking that can corrupt the\nfilesystem.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
          "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-52591",
          "url": "https://www.suse.com/security/cve/CVE-2023-52591"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1221044 for CVE-2023-52591",
          "url": "https://bugzilla.suse.com/1221044"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1221578 for CVE-2023-52591",
          "url": "https://bugzilla.suse.com/1221578"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1221598 for CVE-2023-52591",
          "url": "https://bugzilla.suse.com/1221598"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:30:56Z",
          "details": "important"
        }
      ],
      "title": "CVE-2023-52591"
    },
    {
      "cve": "CVE-2023-52607",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-52607"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\npowerpc/mm: Fix null-pointer dereference in pgtable_cache_add\n\nkasprintf() returns a pointer to dynamically allocated memory\nwhich can be NULL upon failure. Ensure the allocation was successful\nby checking the pointer validity.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
          "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-52607",
          "url": "https://www.suse.com/security/cve/CVE-2023-52607"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1221061 for CVE-2023-52607",
          "url": "https://bugzilla.suse.com/1221061"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:30:56Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-52607"
    },
    {
      "cve": "CVE-2023-52616",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-52616"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: lib/mpi - Fix unexpected pointer access in mpi_ec_init\n\nWhen the mpi_ec_ctx structure is initialized, some fields are not\ncleared, causing a crash when referencing the field when the\nstructure was released. Initially, this issue was ignored because\nmemory for mpi_ec_ctx is allocated with the __GFP_ZERO flag.\nFor example, this error will be triggered when calculating the\nZa value for SM2 separately.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
          "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-52616",
          "url": "https://www.suse.com/security/cve/CVE-2023-52616"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1221612 for CVE-2023-52616",
          "url": "https://bugzilla.suse.com/1221612"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:30:56Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-52616"
    },
    {
      "cve": "CVE-2023-52628",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-52628"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nftables: exthdr: fix 4-byte stack OOB write\n\nIf priv-\u003elen is a multiple of 4, then dst[len / 4] can write past\nthe destination array which leads to stack corruption.\n\nThis construct is necessary to clean the remainder of the register\nin case -\u003elen is NOT a multiple of the register size, so make it\nconditional just like nft_payload.c does.\n\nThe bug was added in 4.1 cycle and then copied/inherited when\ntcp/sctp and ip option support was added.\n\nBug reported by Zero Day Initiative project (ZDI-CAN-21950,\nZDI-CAN-21951, ZDI-CAN-21961).",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
          "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-52628",
          "url": "https://www.suse.com/security/cve/CVE-2023-52628"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222117 for CVE-2023-52628",
          "url": "https://bugzilla.suse.com/1222117"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222118 for CVE-2023-52628",
          "url": "https://bugzilla.suse.com/1222118"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:30:56Z",
          "details": "important"
        }
      ],
      "title": "CVE-2023-52628"
    },
    {
      "cve": "CVE-2023-7042",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-7042"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A null pointer dereference vulnerability was found in ath10k_wmi_tlv_op_pull_mgmt_tx_compl_ev() in drivers/net/wireless/ath/ath10k/wmi-tlv.c in the Linux kernel. This issue could be exploited to trigger a denial of service.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
          "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-7042",
          "url": "https://www.suse.com/security/cve/CVE-2023-7042"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1218336 for CVE-2023-7042",
          "url": "https://bugzilla.suse.com/1218336"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:30:56Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-7042"
    },
    {
      "cve": "CVE-2023-7192",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-7192"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A memory leak problem was found in ctnetlink_create_conntrack in net/netfilter/nf_conntrack_netlink.c in the Linux Kernel. This issue may allow a local attacker with CAP_NET_ADMIN privileges to cause a denial of service (DoS) attack due to a refcount overflow.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
          "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-7192",
          "url": "https://www.suse.com/security/cve/CVE-2023-7192"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1218479 for CVE-2023-7192",
          "url": "https://bugzilla.suse.com/1218479"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1227675 for CVE-2023-7192",
          "url": "https://bugzilla.suse.com/1227675"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:30:56Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-7192"
    },
    {
      "cve": "CVE-2024-0841",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-0841"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A null pointer dereference flaw was found in the hugetlbfs_fill_super function in the Linux kernel hugetlbfs (HugeTLB pages) functionality. This issue may allow a local user to crash the system or potentially escalate their privileges on the system.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
          "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-0841",
          "url": "https://www.suse.com/security/cve/CVE-2024-0841"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1219264 for CVE-2024-0841",
          "url": "https://bugzilla.suse.com/1219264"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:30:56Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-0841"
    },
    {
      "cve": "CVE-2024-22099",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-22099"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "NULL Pointer Dereference vulnerability in Linux Linux kernel kernel on Linux, x86, ARM (net, bluetooth modules) allows Overflow Buffers. This vulnerability is associated with program files /net/bluetooth/rfcomm/core.C.\n\nThis issue affects Linux kernel: v2.6.12-rc2.\n\n",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
          "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-22099",
          "url": "https://www.suse.com/security/cve/CVE-2024-22099"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1219170 for CVE-2024-22099",
          "url": "https://bugzilla.suse.com/1219170"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:30:56Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-22099"
    },
    {
      "cve": "CVE-2024-23307",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-23307"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Integer Overflow or Wraparound vulnerability in Linux Linux kernel kernel on Linux, x86, ARM (md, raid, raid5 modules) allows Forced Integer Overflow.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
          "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-23307",
          "url": "https://www.suse.com/security/cve/CVE-2024-23307"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1219169 for CVE-2024-23307",
          "url": "https://bugzilla.suse.com/1219169"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1220145 for CVE-2024-23307",
          "url": "https://bugzilla.suse.com/1220145"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:30:56Z",
          "details": "important"
        }
      ],
      "title": "CVE-2024-23307"
    },
    {
      "cve": "CVE-2024-23848",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-23848"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel through 6.7.1, there is a use-after-free in cec_queue_msg_fh, related to drivers/media/cec/core/cec-adap.c and drivers/media/cec/core/cec-api.c.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
          "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-23848",
          "url": "https://www.suse.com/security/cve/CVE-2024-23848"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1219104 for CVE-2024-23848",
          "url": "https://bugzilla.suse.com/1219104"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:30:56Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-23848"
    },
    {
      "cve": "CVE-2024-23850",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-23850"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In btrfs_get_root_ref in fs/btrfs/disk-io.c in the Linux kernel through 6.7.1, there can be an assertion failure and crash because a subvolume can be read out too soon after its root item is inserted upon subvolume creation.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
          "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-23850",
          "url": "https://www.suse.com/security/cve/CVE-2024-23850"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1219126 for CVE-2024-23850",
          "url": "https://bugzilla.suse.com/1219126"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:30:56Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-23850"
    },
    {
      "cve": "CVE-2024-26601",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26601"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\next4: regenerate buddy after block freeing failed if under fc replay\n\nThis mostly reverts commit 6bd97bf273bd (\"ext4: remove redundant\nmb_regenerate_buddy()\") and reintroduces mb_regenerate_buddy(). Based on\ncode in mb_free_blocks(), fast commit replay can end up marking as free\nblocks that are already marked as such. This causes corruption of the\nbuddy bitmap so we need to regenerate it in that case.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
          "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26601",
          "url": "https://www.suse.com/security/cve/CVE-2024-26601"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1220342 for CVE-2024-26601",
          "url": "https://bugzilla.suse.com/1220342"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:30:56Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26601"
    },
    {
      "cve": "CVE-2024-26610",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26610"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: iwlwifi: fix a memory corruption\n\niwl_fw_ini_trigger_tlv::data is a pointer to a __le32, which means that\nif we copy to iwl_fw_ini_trigger_tlv::data + offset while offset is in\nbytes, we\u0027ll write past the buffer.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
          "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26610",
          "url": "https://www.suse.com/security/cve/CVE-2024-26610"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1221299 for CVE-2024-26610",
          "url": "https://bugzilla.suse.com/1221299"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1221302 for CVE-2024-26610",
          "url": "https://bugzilla.suse.com/1221302"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:30:56Z",
          "details": "important"
        }
      ],
      "title": "CVE-2024-26610"
    },
    {
      "cve": "CVE-2024-26614",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26614"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntcp: make sure init the accept_queue\u0027s spinlocks once\n\nWhen I run syz\u0027s reproduction C program locally, it causes the following\nissue:\npvqspinlock: lock 0xffff9d181cd5c660 has corrupted value 0x0!\nWARNING: CPU: 19 PID: 21160 at __pv_queued_spin_unlock_slowpath (kernel/locking/qspinlock_paravirt.h:508)\nHardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011\nRIP: 0010:__pv_queued_spin_unlock_slowpath (kernel/locking/qspinlock_paravirt.h:508)\nCode: 73 56 3a ff 90 c3 cc cc cc cc 8b 05 bb 1f 48 01 85 c0 74 05 c3 cc cc cc cc 8b 17 48 89 fe 48 c7 c7\n30 20 ce 8f e8 ad 56 42 ff \u003c0f\u003e 0b c3 cc cc cc cc 0f 0b 0f 1f 40 00 90 90 90 90 90 90 90 90 90\nRSP: 0018:ffffa8d200604cb8 EFLAGS: 00010282\nRAX: 0000000000000000 RBX: 0000000000000000 RCX: ffff9d1ef60e0908\nRDX: 00000000ffffffd8 RSI: 0000000000000027 RDI: ffff9d1ef60e0900\nRBP: ffff9d181cd5c280 R08: 0000000000000000 R09: 00000000ffff7fff\nR10: ffffa8d200604b68 R11: ffffffff907dcdc8 R12: 0000000000000000\nR13: ffff9d181cd5c660 R14: ffff9d1813a3f330 R15: 0000000000001000\nFS:  00007fa110184640(0000) GS:ffff9d1ef60c0000(0000) knlGS:0000000000000000\nCS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 0000000020000000 CR3: 000000011f65e000 CR4: 00000000000006f0\nCall Trace:\n\u003cIRQ\u003e\n  _raw_spin_unlock (kernel/locking/spinlock.c:186)\n  inet_csk_reqsk_queue_add (net/ipv4/inet_connection_sock.c:1321)\n  inet_csk_complete_hashdance (net/ipv4/inet_connection_sock.c:1358)\n  tcp_check_req (net/ipv4/tcp_minisocks.c:868)\n  tcp_v4_rcv (net/ipv4/tcp_ipv4.c:2260)\n  ip_protocol_deliver_rcu (net/ipv4/ip_input.c:205)\n  ip_local_deliver_finish (net/ipv4/ip_input.c:234)\n  __netif_receive_skb_one_core (net/core/dev.c:5529)\n  process_backlog (./include/linux/rcupdate.h:779)\n  __napi_poll (net/core/dev.c:6533)\n  net_rx_action (net/core/dev.c:6604)\n  __do_softirq (./arch/x86/include/asm/jump_label.h:27)\n  do_softirq (kernel/softirq.c:454 kernel/softirq.c:441)\n\u003c/IRQ\u003e\n\u003cTASK\u003e\n  __local_bh_enable_ip (kernel/softirq.c:381)\n  __dev_queue_xmit (net/core/dev.c:4374)\n  ip_finish_output2 (./include/net/neighbour.h:540 net/ipv4/ip_output.c:235)\n  __ip_queue_xmit (net/ipv4/ip_output.c:535)\n  __tcp_transmit_skb (net/ipv4/tcp_output.c:1462)\n  tcp_rcv_synsent_state_process (net/ipv4/tcp_input.c:6469)\n  tcp_rcv_state_process (net/ipv4/tcp_input.c:6657)\n  tcp_v4_do_rcv (net/ipv4/tcp_ipv4.c:1929)\n  __release_sock (./include/net/sock.h:1121 net/core/sock.c:2968)\n  release_sock (net/core/sock.c:3536)\n  inet_wait_for_connect (net/ipv4/af_inet.c:609)\n  __inet_stream_connect (net/ipv4/af_inet.c:702)\n  inet_stream_connect (net/ipv4/af_inet.c:748)\n  __sys_connect (./include/linux/file.h:45 net/socket.c:2064)\n  __x64_sys_connect (net/socket.c:2073 net/socket.c:2070 net/socket.c:2070)\n  do_syscall_64 (arch/x86/entry/common.c:51 arch/x86/entry/common.c:82)\n  entry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:129)\n  RIP: 0033:0x7fa10ff05a3d\n  Code: 5b 41 5c c3 66 0f 1f 84 00 00 00 00 00 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89\n  c2 4d 89 c8 4c 8b 4c 24 08 0f 05 \u003c48\u003e 3d 01 f0 ff ff 73 01 c3 48 8b 0d ab a3 0e 00 f7 d8 64 89 01 48\n  RSP: 002b:00007fa110183de8 EFLAGS: 00000202 ORIG_RAX: 000000000000002a\n  RAX: ffffffffffffffda RBX: 0000000020000054 RCX: 00007fa10ff05a3d\n  RDX: 000000000000001c RSI: 0000000020000040 RDI: 0000000000000003\n  RBP: 00007fa110183e20 R08: 0000000000000000 R09: 0000000000000000\n  R10: 0000000000000000 R11: 0000000000000202 R12: 00007fa110184640\n  R13: 0000000000000000 R14: 00007fa10fe8b060 R15: 00007fff73e23b20\n\u003c/TASK\u003e\n\nThe issue triggering process is analyzed as follows:\nThread A                                       Thread B\ntcp_v4_rcv\t//receive ack TCP packet       inet_shutdown\n  tcp_check_req                                  tcp_disconnect //disconnect sock\n  ...                                              tcp_set_state(sk, TCP_CLOSE)\n    inet_csk_complete_hashdance                ...\n      inet_csk_reqsk_queue_add         \n---truncated---",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
          "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26614",
          "url": "https://www.suse.com/security/cve/CVE-2024-26614"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1221293 for CVE-2024-26614",
          "url": "https://bugzilla.suse.com/1221293"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:30:56Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26614"
    },
    {
      "cve": "CVE-2024-26642",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26642"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nf_tables: disallow anonymous set with timeout flag\n\nAnonymous sets are never used with timeout from userspace, reject this.\nException to this rule is NFT_SET_EVAL to ensure legacy meters still work.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
          "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26642",
          "url": "https://www.suse.com/security/cve/CVE-2024-26642"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1221830 for CVE-2024-26642",
          "url": "https://bugzilla.suse.com/1221830"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:30:56Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26642"
    },
    {
      "cve": "CVE-2024-26687",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26687"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nxen/events: close evtchn after mapping cleanup\n\nshutdown_pirq and startup_pirq are not taking the\nirq_mapping_update_lock because they can\u0027t due to lock inversion. Both\nare called with the irq_desc-\u003elock being taking. The lock order,\nhowever, is first irq_mapping_update_lock and then irq_desc-\u003elock.\n\nThis opens multiple races:\n- shutdown_pirq can be interrupted by a function that allocates an event\n  channel:\n\n  CPU0                        CPU1\n  shutdown_pirq {\n    xen_evtchn_close(e)\n                              __startup_pirq {\n                                EVTCHNOP_bind_pirq\n                                  -\u003e returns just freed evtchn e\n                                set_evtchn_to_irq(e, irq)\n                              }\n    xen_irq_info_cleanup() {\n      set_evtchn_to_irq(e, -1)\n    }\n  }\n\n  Assume here event channel e refers here to the same event channel\n  number.\n  After this race the evtchn_to_irq mapping for e is invalid (-1).\n\n- __startup_pirq races with __unbind_from_irq in a similar way. Because\n  __startup_pirq doesn\u0027t take irq_mapping_update_lock it can grab the\n  evtchn that __unbind_from_irq is currently freeing and cleaning up. In\n  this case even though the event channel is allocated, its mapping can\n  be unset in evtchn_to_irq.\n\nThe fix is to first cleanup the mappings and then close the event\nchannel. In this way, when an event channel gets allocated it\u0027s\npotential previous evtchn_to_irq mappings are guaranteed to be unset already.\nThis is also the reverse order of the allocation where first the event\nchannel is allocated and then the mappings are setup.\n\nOn a 5.10 kernel prior to commit 3fcdaf3d7634 (\"xen/events: modify internal\n[un]bind interfaces\"), we hit a BUG like the following during probing of NVMe\ndevices. The issue is that during nvme_setup_io_queues, pci_free_irq\nis called for every device which results in a call to shutdown_pirq.\nWith many nvme devices it\u0027s therefore likely to hit this race during\nboot because there will be multiple calls to shutdown_pirq and\nstartup_pirq are running potentially in parallel.\n\n  ------------[ cut here ]------------\n  blkfront: xvda: barrier or flush: disabled; persistent grants: enabled; indirect descriptors: enabled; bounce buffer: enabled\n  kernel BUG at drivers/xen/events/events_base.c:499!\n  invalid opcode: 0000 [#1] SMP PTI\n  CPU: 44 PID: 375 Comm: kworker/u257:23 Not tainted 5.10.201-191.748.amzn2.x86_64 #1\n  Hardware name: Xen HVM domU, BIOS 4.11.amazon 08/24/2006\n  Workqueue: nvme-reset-wq nvme_reset_work\n  RIP: 0010:bind_evtchn_to_cpu+0xdf/0xf0\n  Code: 5d 41 5e c3 cc cc cc cc 44 89 f7 e8 2b 55 ad ff 49 89 c5 48 85 c0 0f 84 64 ff ff ff 4c 8b 68 30 41 83 fe ff 0f 85 60 ff ff ff \u003c0f\u003e 0b 66 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 0f 1f 44 00 00\n  RSP: 0000:ffffc9000d533b08 EFLAGS: 00010046\n  RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000006\n  RDX: 0000000000000028 RSI: 00000000ffffffff RDI: 00000000ffffffff\n  RBP: ffff888107419680 R08: 0000000000000000 R09: ffffffff82d72b00\n  R10: 0000000000000000 R11: 0000000000000000 R12: 00000000000001ed\n  R13: 0000000000000000 R14: 00000000ffffffff R15: 0000000000000002\n  FS:  0000000000000000(0000) GS:ffff88bc8b500000(0000) knlGS:0000000000000000\n  CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n  CR2: 0000000000000000 CR3: 0000000002610001 CR4: 00000000001706e0\n  DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n  DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\n  Call Trace:\n   ? show_trace_log_lvl+0x1c1/0x2d9\n   ? show_trace_log_lvl+0x1c1/0x2d9\n   ? set_affinity_irq+0xdc/0x1c0\n   ? __die_body.cold+0x8/0xd\n   ? die+0x2b/0x50\n   ? do_trap+0x90/0x110\n   ? bind_evtchn_to_cpu+0xdf/0xf0\n   ? do_error_trap+0x65/0x80\n   ? bind_evtchn_to_cpu+0xdf/0xf0\n   ? exc_invalid_op+0x4e/0x70\n   ? bind_evtchn_to_cpu+0xdf/0xf0\n   ? asm_exc_invalid_op+0x12/0x20\n   ? bind_evtchn_to_cpu+0xdf/0x\n---truncated---",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
          "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26687",
          "url": "https://www.suse.com/security/cve/CVE-2024-26687"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222435 for CVE-2024-26687",
          "url": "https://bugzilla.suse.com/1222435"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:30:56Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26687"
    },
    {
      "cve": "CVE-2024-26688",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26688"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfs,hugetlb: fix NULL pointer dereference in hugetlbs_fill_super\n\nWhen configuring a hugetlb filesystem via the fsconfig() syscall, there is\na possible NULL dereference in hugetlbfs_fill_super() caused by assigning\nNULL to ctx-\u003ehstate in hugetlbfs_parse_param() when the requested pagesize\nis non valid.\n\nE.g: Taking the following steps:\n\n     fd = fsopen(\"hugetlbfs\", FSOPEN_CLOEXEC);\n     fsconfig(fd, FSCONFIG_SET_STRING, \"pagesize\", \"1024\", 0);\n     fsconfig(fd, FSCONFIG_CMD_CREATE, NULL, NULL, 0);\n\nGiven that the requested \"pagesize\" is invalid, ctxt-\u003ehstate will be replaced\nwith NULL, losing its previous value, and we will print an error:\n\n ...\n ...\n case Opt_pagesize:\n ps = memparse(param-\u003estring, \u0026rest);\n ctx-\u003ehstate = h;\n if (!ctx-\u003ehstate) {\n         pr_err(\"Unsupported page size %lu MB\\n\", ps / SZ_1M);\n         return -EINVAL;\n }\n return 0;\n ...\n ...\n\nThis is a problem because later on, we will dereference ctxt-\u003ehstate in\nhugetlbfs_fill_super()\n\n ...\n ...\n sb-\u003es_blocksize = huge_page_size(ctx-\u003ehstate);\n ...\n ...\n\nCausing below Oops.\n\nFix this by replacing cxt-\u003ehstate value only when then pagesize is known\nto be valid.\n\n kernel: hugetlbfs: Unsupported page size 0 MB\n kernel: BUG: kernel NULL pointer dereference, address: 0000000000000028\n kernel: #PF: supervisor read access in kernel mode\n kernel: #PF: error_code(0x0000) - not-present page\n kernel: PGD 800000010f66c067 P4D 800000010f66c067 PUD 1b22f8067 PMD 0\n kernel: Oops: 0000 [#1] PREEMPT SMP PTI\n kernel: CPU: 4 PID: 5659 Comm: syscall Tainted: G            E      6.8.0-rc2-default+ #22 5a47c3fef76212addcc6eb71344aabc35190ae8f\n kernel: Hardware name: Intel Corp. GROVEPORT/GROVEPORT, BIOS GVPRCRB1.86B.0016.D04.1705030402 05/03/2017\n kernel: RIP: 0010:hugetlbfs_fill_super+0xb4/0x1a0\n kernel: Code: 48 8b 3b e8 3e c6 ed ff 48 85 c0 48 89 45 20 0f 84 d6 00 00 00 48 b8 ff ff ff ff ff ff ff 7f 4c 89 e7 49 89 44 24 20 48 8b 03 \u003c8b\u003e 48 28 b8 00 10 00 00 48 d3 e0 49 89 44 24 18 48 8b 03 8b 40 28\n kernel: RSP: 0018:ffffbe9960fcbd48 EFLAGS: 00010246\n kernel: RAX: 0000000000000000 RBX: ffff9af5272ae780 RCX: 0000000000372004\n kernel: RDX: ffffffffffffffff RSI: ffffffffffffffff RDI: ffff9af555e9b000\n kernel: RBP: ffff9af52ee66b00 R08: 0000000000000040 R09: 0000000000370004\n kernel: R10: ffffbe9960fcbd48 R11: 0000000000000040 R12: ffff9af555e9b000\n kernel: R13: ffffffffa66b86c0 R14: ffff9af507d2f400 R15: ffff9af507d2f400\n kernel: FS:  00007ffbc0ba4740(0000) GS:ffff9b0bd7000000(0000) knlGS:0000000000000000\n kernel: CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n kernel: CR2: 0000000000000028 CR3: 00000001b1ee0000 CR4: 00000000001506f0\n kernel: Call Trace:\n kernel:  \u003cTASK\u003e\n kernel:  ? __die_body+0x1a/0x60\n kernel:  ? page_fault_oops+0x16f/0x4a0\n kernel:  ? search_bpf_extables+0x65/0x70\n kernel:  ? fixup_exception+0x22/0x310\n kernel:  ? exc_page_fault+0x69/0x150\n kernel:  ? asm_exc_page_fault+0x22/0x30\n kernel:  ? __pfx_hugetlbfs_fill_super+0x10/0x10\n kernel:  ? hugetlbfs_fill_super+0xb4/0x1a0\n kernel:  ? hugetlbfs_fill_super+0x28/0x1a0\n kernel:  ? __pfx_hugetlbfs_fill_super+0x10/0x10\n kernel:  vfs_get_super+0x40/0xa0\n kernel:  ? __pfx_bpf_lsm_capable+0x10/0x10\n kernel:  vfs_get_tree+0x25/0xd0\n kernel:  vfs_cmd_create+0x64/0xe0\n kernel:  __x64_sys_fsconfig+0x395/0x410\n kernel:  do_syscall_64+0x80/0x160\n kernel:  ? syscall_exit_to_user_mode+0x82/0x240\n kernel:  ? do_syscall_64+0x8d/0x160\n kernel:  ? syscall_exit_to_user_mode+0x82/0x240\n kernel:  ? do_syscall_64+0x8d/0x160\n kernel:  ? exc_page_fault+0x69/0x150\n kernel:  entry_SYSCALL_64_after_hwframe+0x6e/0x76\n kernel: RIP: 0033:0x7ffbc0cb87c9\n kernel: Code: 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 \u003c48\u003e 3d 01 f0 ff ff 73 01 c3 48 8b 0d 97 96 0d 00 f7 d8 64 89 01 48\n kernel: RSP: 002b:00007ffc29d2f388 EFLAGS: 00000206 ORIG_RAX: 00000000000001af\n kernel: RAX: fffffffffff\n---truncated---",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
          "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26688",
          "url": "https://www.suse.com/security/cve/CVE-2024-26688"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222482 for CVE-2024-26688",
          "url": "https://bugzilla.suse.com/1222482"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:30:56Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26688"
    },
    {
      "cve": "CVE-2024-26689",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26689"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nceph: prevent use-after-free in encode_cap_msg()\n\nIn fs/ceph/caps.c, in encode_cap_msg(), \"use after free\" error was\ncaught by KASAN at this line - \u0027ceph_buffer_get(arg-\u003exattr_buf);\u0027. This\nimplies before the refcount could be increment here, it was freed.\n\nIn same file, in \"handle_cap_grant()\" refcount is decremented by this\nline - \u0027ceph_buffer_put(ci-\u003ei_xattrs.blob);\u0027. It appears that a race\noccurred and resource was freed by the latter line before the former\nline could increment it.\n\nencode_cap_msg() is called by __send_cap() and __send_cap() is called by\nceph_check_caps() after calling __prep_cap(). __prep_cap() is where\narg-\u003exattr_buf is assigned to ci-\u003ei_xattrs.blob. This is the spot where\nthe refcount must be increased to prevent \"use after free\" error.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
          "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26689",
          "url": "https://www.suse.com/security/cve/CVE-2024-26689"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222503 for CVE-2024-26689",
          "url": "https://bugzilla.suse.com/1222503"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:30:56Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26689"
    },
    {
      "cve": "CVE-2024-26704",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26704"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\next4: fix double-free of blocks due to wrong extents moved_len\n\nIn ext4_move_extents(), moved_len is only updated when all moves are\nsuccessfully executed, and only discards orig_inode and donor_inode\npreallocations when moved_len is not zero. When the loop fails to exit\nafter successfully moving some extents, moved_len is not updated and\nremains at 0, so it does not discard the preallocations.\n\nIf the moved extents overlap with the preallocated extents, the\noverlapped extents are freed twice in ext4_mb_release_inode_pa() and\next4_process_freed_data() (as described in commit 94d7c16cbbbd (\"ext4:\nFix double-free of blocks with EXT4_IOC_MOVE_EXT\")), and bb_free is\nincremented twice. Hence when trim is executed, a zero-division bug is\ntriggered in mb_update_avg_fragment_size() because bb_free is not zero\nand bb_fragments is zero.\n\nTherefore, update move_len after each extent move to avoid the issue.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
          "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26704",
          "url": "https://www.suse.com/security/cve/CVE-2024-26704"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222422 for CVE-2024-26704",
          "url": "https://bugzilla.suse.com/1222422"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:30:56Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26704"
    },
    {
      "cve": "CVE-2024-26727",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26727"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: do not ASSERT() if the newly created subvolume already got read\n\n[BUG]\nThere is a syzbot crash, triggered by the ASSERT() during subvolume\ncreation:\n\n assertion failed: !anon_dev, in fs/btrfs/disk-io.c:1319\n ------------[ cut here ]------------\n kernel BUG at fs/btrfs/disk-io.c:1319!\n invalid opcode: 0000 [#1] PREEMPT SMP KASAN\n RIP: 0010:btrfs_get_root_ref.part.0+0x9aa/0xa60\n  \u003cTASK\u003e\n  btrfs_get_new_fs_root+0xd3/0xf0\n  create_subvol+0xd02/0x1650\n  btrfs_mksubvol+0xe95/0x12b0\n  __btrfs_ioctl_snap_create+0x2f9/0x4f0\n  btrfs_ioctl_snap_create+0x16b/0x200\n  btrfs_ioctl+0x35f0/0x5cf0\n  __x64_sys_ioctl+0x19d/0x210\n  do_syscall_64+0x3f/0xe0\n  entry_SYSCALL_64_after_hwframe+0x63/0x6b\n ---[ end trace 0000000000000000 ]---\n\n[CAUSE]\nDuring create_subvol(), after inserting root item for the newly created\nsubvolume, we would trigger btrfs_get_new_fs_root() to get the\nbtrfs_root of that subvolume.\n\nThe idea here is, we have preallocated an anonymous device number for\nthe subvolume, thus we can assign it to the new subvolume.\n\nBut there is really nothing preventing things like backref walk to read\nthe new subvolume.\nIf that happens before we call btrfs_get_new_fs_root(), the subvolume\nwould be read out, with a new anonymous device number assigned already.\n\nIn that case, we would trigger ASSERT(), as we really expect no one to\nread out that subvolume (which is not yet accessible from the fs).\nBut things like backref walk is still possible to trigger the read on\nthe subvolume.\n\nThus our assumption on the ASSERT() is not correct in the first place.\n\n[FIX]\nFix it by removing the ASSERT(), and just free the @anon_dev, reset it\nto 0, and continue.\n\nIf the subvolume tree is read out by something else, it should have\nalready get a new anon_dev assigned thus we only need to free the\npreallocated one.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
          "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26727",
          "url": "https://www.suse.com/security/cve/CVE-2024-26727"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222536 for CVE-2024-26727",
          "url": "https://bugzilla.suse.com/1222536"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:30:56Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26727"
    },
    {
      "cve": "CVE-2024-26733",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26733"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\narp: Prevent overflow in arp_req_get().\n\nsyzkaller reported an overflown write in arp_req_get(). [0]\n\nWhen ioctl(SIOCGARP) is issued, arp_req_get() looks up an neighbour\nentry and copies neigh-\u003eha to struct arpreq.arp_ha.sa_data.\n\nThe arp_ha here is struct sockaddr, not struct sockaddr_storage, so\nthe sa_data buffer is just 14 bytes.\n\nIn the splat below, 2 bytes are overflown to the next int field,\narp_flags.  We initialise the field just after the memcpy(), so it\u0027s\nnot a problem.\n\nHowever, when dev-\u003eaddr_len is greater than 22 (e.g. MAX_ADDR_LEN),\narp_netmask is overwritten, which could be set as htonl(0xFFFFFFFFUL)\nin arp_ioctl() before calling arp_req_get().\n\nTo avoid the overflow, let\u0027s limit the max length of memcpy().\n\nNote that commit b5f0de6df6dc (\"net: dev: Convert sa_data to flexible\narray in struct sockaddr\") just silenced syzkaller.\n\n[0]:\nmemcpy: detected field-spanning write (size 16) of single field \"r-\u003earp_ha.sa_data\" at net/ipv4/arp.c:1128 (size 14)\nWARNING: CPU: 0 PID: 144638 at net/ipv4/arp.c:1128 arp_req_get+0x411/0x4a0 net/ipv4/arp.c:1128\nModules linked in:\nCPU: 0 PID: 144638 Comm: syz-executor.4 Not tainted 6.1.74 #31\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.0-debian-1.16.0-5 04/01/2014\nRIP: 0010:arp_req_get+0x411/0x4a0 net/ipv4/arp.c:1128\nCode: fd ff ff e8 41 42 de fb b9 0e 00 00 00 4c 89 fe 48 c7 c2 20 6d ab 87 48 c7 c7 80 6d ab 87 c6 05 25 af 72 04 01 e8 5f 8d ad fb \u003c0f\u003e 0b e9 6c fd ff ff e8 13 42 de fb be 03 00 00 00 4c 89 e7 e8 a6\nRSP: 0018:ffffc900050b7998 EFLAGS: 00010286\nRAX: 0000000000000000 RBX: ffff88803a815000 RCX: 0000000000000000\nRDX: 0000000000000000 RSI: ffffffff8641a44a RDI: 0000000000000001\nRBP: ffffc900050b7a98 R08: 0000000000000001 R09: 0000000000000000\nR10: 0000000000000000 R11: 203a7970636d656d R12: ffff888039c54000\nR13: 1ffff92000a16f37 R14: ffff88803a815084 R15: 0000000000000010\nFS:  00007f172bf306c0(0000) GS:ffff88805aa00000(0000) knlGS:0000000000000000\nCS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 00007f172b3569f0 CR3: 0000000057f12005 CR4: 0000000000770ef0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\nPKRU: 55555554\nCall Trace:\n \u003cTASK\u003e\n arp_ioctl+0x33f/0x4b0 net/ipv4/arp.c:1261\n inet_ioctl+0x314/0x3a0 net/ipv4/af_inet.c:981\n sock_do_ioctl+0xdf/0x260 net/socket.c:1204\n sock_ioctl+0x3ef/0x650 net/socket.c:1321\n vfs_ioctl fs/ioctl.c:51 [inline]\n __do_sys_ioctl fs/ioctl.c:870 [inline]\n __se_sys_ioctl fs/ioctl.c:856 [inline]\n __x64_sys_ioctl+0x18e/0x220 fs/ioctl.c:856\n do_syscall_x64 arch/x86/entry/common.c:51 [inline]\n do_syscall_64+0x37/0x90 arch/x86/entry/common.c:81\n entry_SYSCALL_64_after_hwframe+0x64/0xce\nRIP: 0033:0x7f172b262b8d\nCode: 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 \u003c48\u003e 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48\nRSP: 002b:00007f172bf300b8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010\nRAX: ffffffffffffffda RBX: 00007f172b3abf80 RCX: 00007f172b262b8d\nRDX: 0000000020000000 RSI: 0000000000008954 RDI: 0000000000000003\nRBP: 00007f172b2d3493 R08: 0000000000000000 R09: 0000000000000000\nR10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000\nR13: 000000000000000b R14: 00007f172b3abf80 R15: 00007f172bf10000\n \u003c/TASK\u003e",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
          "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26733",
          "url": "https://www.suse.com/security/cve/CVE-2024-26733"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222585 for CVE-2024-26733",
          "url": "https://bugzilla.suse.com/1222585"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:30:56Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26733"
    },
    {
      "cve": "CVE-2024-26739",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26739"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/sched: act_mirred: don\u0027t override retval if we already lost the skb\n\nIf we\u0027re redirecting the skb, and haven\u0027t called tcf_mirred_forward(),\nyet, we need to tell the core to drop the skb by setting the retcode\nto SHOT. If we have called tcf_mirred_forward(), however, the skb\nis out of our hands and returning SHOT will lead to UaF.\n\nMove the retval override to the error path which actually need it.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
          "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26739",
          "url": "https://www.suse.com/security/cve/CVE-2024-26739"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222559 for CVE-2024-26739",
          "url": "https://bugzilla.suse.com/1222559"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:30:56Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26739"
    },
    {
      "cve": "CVE-2024-26764",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26764"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfs/aio: Restrict kiocb_set_cancel_fn() to I/O submitted via libaio\n\nIf kiocb_set_cancel_fn() is called for I/O submitted via io_uring, the\nfollowing kernel warning appears:\n\nWARNING: CPU: 3 PID: 368 at fs/aio.c:598 kiocb_set_cancel_fn+0x9c/0xa8\nCall trace:\n kiocb_set_cancel_fn+0x9c/0xa8\n ffs_epfile_read_iter+0x144/0x1d0\n io_read+0x19c/0x498\n io_issue_sqe+0x118/0x27c\n io_submit_sqes+0x25c/0x5fc\n __arm64_sys_io_uring_enter+0x104/0xab0\n invoke_syscall+0x58/0x11c\n el0_svc_common+0xb4/0xf4\n do_el0_svc+0x2c/0xb0\n el0_svc+0x2c/0xa4\n el0t_64_sync_handler+0x68/0xb4\n el0t_64_sync+0x1a4/0x1a8\n\nFix this by setting the IOCB_AIO_RW flag for read and write I/O that is\nsubmitted by libaio.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
          "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26764",
          "url": "https://www.suse.com/security/cve/CVE-2024-26764"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222721 for CVE-2024-26764",
          "url": "https://bugzilla.suse.com/1222721"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:30:56Z",
          "details": "low"
        }
      ],
      "title": "CVE-2024-26764"
    },
    {
      "cve": "CVE-2024-26766",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26766"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nIB/hfi1: Fix sdma.h tx-\u003enum_descs off-by-one error\n\nUnfortunately the commit `fd8958efe877` introduced another error\ncausing the `descs` array to overflow. This reults in further crashes\neasily reproducible by `sendmsg` system call.\n\n[ 1080.836473] general protection fault, probably for non-canonical address 0x400300015528b00a: 0000 [#1] PREEMPT SMP PTI\n[ 1080.869326] RIP: 0010:hfi1_ipoib_build_ib_tx_headers.constprop.0+0xe1/0x2b0 [hfi1]\n--\n[ 1080.974535] Call Trace:\n[ 1080.976990]  \u003cTASK\u003e\n[ 1081.021929]  hfi1_ipoib_send_dma_common+0x7a/0x2e0 [hfi1]\n[ 1081.027364]  hfi1_ipoib_send_dma_list+0x62/0x270 [hfi1]\n[ 1081.032633]  hfi1_ipoib_send+0x112/0x300 [hfi1]\n[ 1081.042001]  ipoib_start_xmit+0x2a9/0x2d0 [ib_ipoib]\n[ 1081.046978]  dev_hard_start_xmit+0xc4/0x210\n--\n[ 1081.148347]  __sys_sendmsg+0x59/0xa0\n\ncrash\u003e ipoib_txreq 0xffff9cfeba229f00\nstruct ipoib_txreq {\n  txreq = {\n    list = {\n      next = 0xffff9cfeba229f00,\n      prev = 0xffff9cfeba229f00\n    },\n    descp = 0xffff9cfeba229f40,\n    coalesce_buf = 0x0,\n    wait = 0xffff9cfea4e69a48,\n    complete = 0xffffffffc0fe0760 \u003chfi1_ipoib_sdma_complete\u003e,\n    packet_len = 0x46d,\n    tlen = 0x0,\n    num_desc = 0x0,\n    desc_limit = 0x6,\n    next_descq_idx = 0x45c,\n    coalesce_idx = 0x0,\n    flags = 0x0,\n    descs = {{\n        qw = {0x8024000120dffb00, 0x4}  # SDMA_DESC0_FIRST_DESC_FLAG (bit 63)\n      }, {\n        qw = {  0x3800014231b108, 0x4}\n      }, {\n        qw = { 0x310000e4ee0fcf0, 0x8}\n      }, {\n        qw = {  0x3000012e9f8000, 0x8}\n      }, {\n        qw = {  0x59000dfb9d0000, 0x8}\n      }, {\n        qw = {  0x78000e02e40000, 0x8}\n      }}\n  },\n  sdma_hdr =  0x400300015528b000,  \u003c\u003c\u003c invalid pointer in the tx request structure\n  sdma_status = 0x0,                   SDMA_DESC0_LAST_DESC_FLAG (bit 62)\n  complete = 0x0,\n  priv = 0x0,\n  txq = 0xffff9cfea4e69880,\n  skb = 0xffff9d099809f400\n}\n\nIf an SDMA send consists of exactly 6 descriptors and requires dword\npadding (in the 7th descriptor), the sdma_txreq descriptor array is not\nproperly expanded and the packet will overflow into the container\nstructure. This results in a panic when the send completion runs. The\nexact panic varies depending on what elements of the container structure\nget corrupted. The fix is to use the correct expression in\n_pad_sdma_tx_descs() to test the need to expand the descriptor array.\n\nWith this patch the crashes are no longer reproducible and the machine is\nstable.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
          "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26766",
          "url": "https://www.suse.com/security/cve/CVE-2024-26766"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222726 for CVE-2024-26766",
          "url": "https://bugzilla.suse.com/1222726"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222882 for CVE-2024-26766",
          "url": "https://bugzilla.suse.com/1222882"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:30:56Z",
          "details": "important"
        }
      ],
      "title": "CVE-2024-26766"
    },
    {
      "cve": "CVE-2024-26773",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26773"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\next4: avoid allocating blocks from corrupted group in ext4_mb_try_best_found()\n\nDetermine if the group block bitmap is corrupted before using ac_b_ex in\next4_mb_try_best_found() to avoid allocating blocks from a group with a\ncorrupted block bitmap in the following concurrency and making the\nsituation worse.\n\next4_mb_regular_allocator\n  ext4_lock_group(sb, group)\n  ext4_mb_good_group\n   // check if the group bbitmap is corrupted\n  ext4_mb_complex_scan_group\n   // Scan group gets ac_b_ex but doesn\u0027t use it\n  ext4_unlock_group(sb, group)\n                           ext4_mark_group_bitmap_corrupted(group)\n                           // The block bitmap was corrupted during\n                           // the group unlock gap.\n  ext4_mb_try_best_found\n    ext4_lock_group(ac-\u003eac_sb, group)\n    ext4_mb_use_best_found\n      mb_mark_used\n      // Allocating blocks in block bitmap corrupted group",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
          "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26773",
          "url": "https://www.suse.com/security/cve/CVE-2024-26773"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222618 for CVE-2024-26773",
          "url": "https://bugzilla.suse.com/1222618"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:30:56Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26773"
    },
    {
      "cve": "CVE-2024-26792",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26792"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: fix double free of anonymous device after snapshot creation failure\n\nWhen creating a snapshot we may do a double free of an anonymous device\nin case there\u0027s an error committing the transaction. The second free may\nresult in freeing an anonymous device number that was allocated by some\nother subsystem in the kernel or another btrfs filesystem.\n\nThe steps that lead to this:\n\n1) At ioctl.c:create_snapshot() we allocate an anonymous device number\n   and assign it to pending_snapshot-\u003eanon_dev;\n\n2) Then we call btrfs_commit_transaction() and end up at\n   transaction.c:create_pending_snapshot();\n\n3) There we call btrfs_get_new_fs_root() and pass it the anonymous device\n   number stored in pending_snapshot-\u003eanon_dev;\n\n4) btrfs_get_new_fs_root() frees that anonymous device number because\n   btrfs_lookup_fs_root() returned a root - someone else did a lookup\n   of the new root already, which could some task doing backref walking;\n\n5) After that some error happens in the transaction commit path, and at\n   ioctl.c:create_snapshot() we jump to the \u0027fail\u0027 label, and after\n   that we free again the same anonymous device number, which in the\n   meanwhile may have been reallocated somewhere else, because\n   pending_snapshot-\u003eanon_dev still has the same value as in step 1.\n\nRecently syzbot ran into this and reported the following trace:\n\n  ------------[ cut here ]------------\n  ida_free called for id=51 which is not allocated.\n  WARNING: CPU: 1 PID: 31038 at lib/idr.c:525 ida_free+0x370/0x420 lib/idr.c:525\n  Modules linked in:\n  CPU: 1 PID: 31038 Comm: syz-executor.2 Not tainted 6.8.0-rc4-syzkaller-00410-gc02197fc9076 #0\n  Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024\n  RIP: 0010:ida_free+0x370/0x420 lib/idr.c:525\n  Code: 10 42 80 3c 28 (...)\n  RSP: 0018:ffffc90015a67300 EFLAGS: 00010246\n  RAX: be5130472f5dd000 RBX: 0000000000000033 RCX: 0000000000040000\n  RDX: ffffc90009a7a000 RSI: 000000000003ffff RDI: 0000000000040000\n  RBP: ffffc90015a673f0 R08: ffffffff81577992 R09: 1ffff92002b4cdb4\n  R10: dffffc0000000000 R11: fffff52002b4cdb5 R12: 0000000000000246\n  R13: dffffc0000000000 R14: ffffffff8e256b80 R15: 0000000000000246\n  FS:  00007fca3f4b46c0(0000) GS:ffff8880b9500000(0000) knlGS:0000000000000000\n  CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n  CR2: 00007f167a17b978 CR3: 000000001ed26000 CR4: 0000000000350ef0\n  Call Trace:\n   \u003cTASK\u003e\n   btrfs_get_root_ref+0xa48/0xaf0 fs/btrfs/disk-io.c:1346\n   create_pending_snapshot+0xff2/0x2bc0 fs/btrfs/transaction.c:1837\n   create_pending_snapshots+0x195/0x1d0 fs/btrfs/transaction.c:1931\n   btrfs_commit_transaction+0xf1c/0x3740 fs/btrfs/transaction.c:2404\n   create_snapshot+0x507/0x880 fs/btrfs/ioctl.c:848\n   btrfs_mksubvol+0x5d0/0x750 fs/btrfs/ioctl.c:998\n   btrfs_mksnapshot+0xb5/0xf0 fs/btrfs/ioctl.c:1044\n   __btrfs_ioctl_snap_create+0x387/0x4b0 fs/btrfs/ioctl.c:1306\n   btrfs_ioctl_snap_create_v2+0x1ca/0x400 fs/btrfs/ioctl.c:1393\n   btrfs_ioctl+0xa74/0xd40\n   vfs_ioctl fs/ioctl.c:51 [inline]\n   __do_sys_ioctl fs/ioctl.c:871 [inline]\n   __se_sys_ioctl+0xfe/0x170 fs/ioctl.c:857\n   do_syscall_64+0xfb/0x240\n   entry_SYSCALL_64_after_hwframe+0x6f/0x77\n  RIP: 0033:0x7fca3e67dda9\n  Code: 28 00 00 00 (...)\n  RSP: 002b:00007fca3f4b40c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010\n  RAX: ffffffffffffffda RBX: 00007fca3e7abf80 RCX: 00007fca3e67dda9\n  RDX: 00000000200005c0 RSI: 0000000050009417 RDI: 0000000000000003\n  RBP: 00007fca3e6ca47a R08: 0000000000000000 R09: 0000000000000000\n  R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000\n  R13: 000000000000000b R14: 00007fca3e7abf80 R15: 00007fff6bf95658\n   \u003c/TASK\u003e\n\nWhere we get an explicit message where we attempt to free an anonymous\ndevice number that is not currently allocated. It happens in a different\ncode path from the example below, at btrfs_get_root_ref(), so this change\nmay not fix the case triggered by sy\n---truncated---",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
          "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26792",
          "url": "https://www.suse.com/security/cve/CVE-2024-26792"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222430 for CVE-2024-26792",
          "url": "https://bugzilla.suse.com/1222430"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:30:56Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26792"
    },
    {
      "cve": "CVE-2024-26816",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26816"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nx86, relocs: Ignore relocations in .notes section\n\nWhen building with CONFIG_XEN_PV=y, .text symbols are emitted into\nthe .notes section so that Xen can find the \"startup_xen\" entry point.\nThis information is used prior to booting the kernel, so relocations\nare not useful. In fact, performing relocations against the .notes\nsection means that the KASLR base is exposed since /sys/kernel/notes\nis world-readable.\n\nTo avoid leaking the KASLR base without breaking unprivileged tools that\nare expecting to read /sys/kernel/notes, skip performing relocations in\nthe .notes section. The values readable in .notes are then identical to\nthose found in System.map.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
          "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26816",
          "url": "https://www.suse.com/security/cve/CVE-2024-26816"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222624 for CVE-2024-26816",
          "url": "https://bugzilla.suse.com/1222624"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:30:56Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26816"
    },
    {
      "cve": "CVE-2024-26898",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26898"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\naoe: fix the potential use-after-free problem in aoecmd_cfg_pkts\n\nThis patch is against CVE-2023-6270. The description of cve is:\n\n  A flaw was found in the ATA over Ethernet (AoE) driver in the Linux\n  kernel. The aoecmd_cfg_pkts() function improperly updates the refcnt on\n  `struct net_device`, and a use-after-free can be triggered by racing\n  between the free on the struct and the access through the `skbtxq`\n  global queue. This could lead to a denial of service condition or\n  potential code execution.\n\nIn aoecmd_cfg_pkts(), it always calls dev_put(ifp) when skb initial\ncode is finished. But the net_device ifp will still be used in\nlater tx()-\u003edev_queue_xmit() in kthread. Which means that the\ndev_put(ifp) should NOT be called in the success path of skb\ninitial code in aoecmd_cfg_pkts(). Otherwise tx() may run into\nuse-after-free because the net_device is freed.\n\nThis patch removed the dev_put(ifp) in the success path in\naoecmd_cfg_pkts(), and added dev_put() after skb xmit in tx().",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
          "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26898",
          "url": "https://www.suse.com/security/cve/CVE-2024-26898"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1218562 for CVE-2024-26898",
          "url": "https://bugzilla.suse.com/1218562"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223016 for CVE-2024-26898",
          "url": "https://bugzilla.suse.com/1223016"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223017 for CVE-2024-26898",
          "url": "https://bugzilla.suse.com/1223017"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:30:56Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26898"
    },
    {
      "cve": "CVE-2024-26903",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26903"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: rfcomm: Fix null-ptr-deref in rfcomm_check_security\n\nDuring our fuzz testing of the connection and disconnection process at the\nRFCOMM layer, we discovered this bug. By comparing the packets from a\nnormal connection and disconnection process with the testcase that\ntriggered a KASAN report. We analyzed the cause of this bug as follows:\n\n1. In the packets captured during a normal connection, the host sends a\n`Read Encryption Key Size` type of `HCI_CMD` packet\n(Command Opcode: 0x1408) to the controller to inquire the length of\nencryption key.After receiving this packet, the controller immediately\nreplies with a Command Completepacket (Event Code: 0x0e) to return the\nEncryption Key Size.\n\n2. In our fuzz test case, the timing of the controller\u0027s response to this\npacket was delayed to an unexpected point: after the RFCOMM and L2CAP\nlayers had disconnected but before the HCI layer had disconnected.\n\n3. After receiving the Encryption Key Size Response at the time described\nin point 2, the host still called the rfcomm_check_security function.\nHowever, by this time `struct l2cap_conn *conn = l2cap_pi(sk)-\u003echan-\u003econn;`\nhad already been released, and when the function executed\n`return hci_conn_security(conn-\u003ehcon, d-\u003esec_level, auth_type, d-\u003eout);`,\nspecifically when accessing `conn-\u003ehcon`, a null-ptr-deref error occurred.\n\nTo fix this bug, check if `sk-\u003esk_state` is BT_CLOSED before calling\nrfcomm_recv_frame in rfcomm_process_rx.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
          "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26903",
          "url": "https://www.suse.com/security/cve/CVE-2024-26903"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223187 for CVE-2024-26903",
          "url": "https://bugzilla.suse.com/1223187"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:30:56Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26903"
    },
    {
      "cve": "CVE-2024-27043",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-27043"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: edia: dvbdev: fix a use-after-free\n\nIn dvb_register_device, *pdvbdev is set equal to dvbdev, which is freed\nin several error-handling paths. However, *pdvbdev is not set to NULL\nafter dvbdev\u0027s deallocation, causing use-after-frees in many places,\nfor example, in the following call chain:\n\nbudget_register\n  |-\u003e dvb_dmxdev_init\n        |-\u003e dvb_register_device\n  |-\u003e dvb_dmxdev_release\n        |-\u003e dvb_unregister_device\n              |-\u003e dvb_remove_device\n                    |-\u003e dvb_device_put\n                          |-\u003e kref_put\n\nWhen calling dvb_unregister_device, dmxdev-\u003edvbdev (i.e. *pdvbdev in\ndvb_register_device) could point to memory that had been freed in\ndvb_register_device. Thereafter, this pointer is transferred to\nkref_put and triggering a use-after-free.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
          "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-27043",
          "url": "https://www.suse.com/security/cve/CVE-2024-27043"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1218562 for CVE-2024-27043",
          "url": "https://bugzilla.suse.com/1218562"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223824 for CVE-2024-27043",
          "url": "https://bugzilla.suse.com/1223824"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223825 for CVE-2024-27043",
          "url": "https://bugzilla.suse.com/1223825"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:30:56Z",
          "details": "important"
        }
      ],
      "title": "CVE-2024-27043"
    },
    {
      "cve": "CVE-2024-27389",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-27389"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\npstore: inode: Only d_invalidate() is needed\n\nUnloading a modular pstore backend with records in pstorefs would\ntrigger the dput() double-drop warning:\n\n  WARNING: CPU: 0 PID: 2569 at fs/dcache.c:762 dput.part.0+0x3f3/0x410\n\nUsing the combo of d_drop()/dput() (as mentioned in\nDocumentation/filesystems/vfs.rst) isn\u0027t the right approach here, and\nleads to the reference counting problem seen above. Use d_invalidate()\nand update the code to not bother checking for error codes that can\nnever happen.\n\n---",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
          "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
          "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-27389",
          "url": "https://www.suse.com/security/cve/CVE-2024-27389"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223705 for CVE-2024-27389",
          "url": "https://bugzilla.suse.com/1223705"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.79.1.noarch",
            "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.79.1.x86_64",
            "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.79.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:30:56Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-27389"
    }
  ]
}
  suse-su-2024:1644-1
Vulnerability from csaf_suse
Published
2024-05-14 14:29
    Modified
2024-05-14 14:29
    Summary
Security update for the Linux Kernel
    Notes
Title of the patch
Security update for the Linux Kernel
    Description of the patch
The SUSE Linux Enterprise 15 SP5 Azure kernel was updated to receive various security bugfixes.
The following security bugs were fixed:
- CVE-2024-27389: Fixed pstore inode handling with d_invalidate() (bsc#1223705).
- CVE-2024-27062: Fixed nouveau lock inside client object tree (bsc#1223834).
- CVE-2024-27056: Fixed wifi/iwlwifi/mvm to ensure offloading TID queue exists (bsc#1223822).
- CVE-2024-27046: Fixed nfp/flower handling acti_netdevs allocation failure (bsc#1223827).
- CVE-2024-27043: Fixed a use-after-free in edia/dvbdev in different places (bsc#1223824).
- CVE-2024-27042: Fixed drm/amdgpu for potential out-of-bounds access in amdgpu_discovery_reg_base_init() (bsc#1223823).
- CVE-2024-27041: Fixed drm/amd/display NULL checks for adev->dm.dc in amdgpu_dm_fini() (bsc#1223714).
- CVE-2024-27039: Fixed clk/hisilicon/hi3559a an erroneous devm_kfree() (bsc#1223821).
- CVE-2024-27038: Fixed clk_core_get NULL pointer dereference (bsc#1223816).
- CVE-2024-27030: Fixed octeontx2-af to use separate handlers for interrupts (bsc#1223790).
- CVE-2024-27014: Fixed net/mlx5e to prevent deadlock while disabling aRFS (bsc#1223735).
- CVE-2024-27013: Fixed tun limit printing rate when illegal packet received by tun device (bsc#1223745).
- CVE-2024-26993: Fixed fs/sysfs reference leak in sysfs_break_active_protection() (bsc#1223693).
- CVE-2024-26982: Fixed Squashfs inode number check not to be an invalid value of zero (bsc#1223634).
- CVE-2024-26970: Fixed clk/qcom/gcc-ipq6018 termination of frequency table arrays (bsc#1223644).
- CVE-2024-26969: Fixed clk/qcom/gcc-ipq8074 termination of frequency table arrays (bsc#1223645).
- CVE-2024-26966: Fixed clk/qcom/mmcc-apq8084 termination of frequency table arrays (bsc#1223646).
- CVE-2024-26965: Fixed clk/qcom/mmcc-msm8974 termination of frequency table arrays (bsc#1223648).
- CVE-2024-26960: Fixed mm/swap race between free_swap_and_cache() and swapoff() (bsc#1223655).
- CVE-2024-26951: Fixed wireguard/netlink check for dangling peer via is_dead instead of empty list (bsc#1223660).
- CVE-2024-26950: Fixed wireguard/netlink to access device through ctx instead of peer (bsc#1223661).
- CVE-2024-26948: Fixed drm/amd/display by adding dc_state NULL check in dc_state_release (bsc#1223664).
- CVE-2024-26939: Fixed drm/i915/vma UAF on destroy against retire race (bsc#1223679).
- CVE-2024-26927: Fixed ASoC/SOF bounds checking to firmware data Smatch (bsc#1223525).
- CVE-2024-26915: Fixed drm/amdgpu reset IH OVERFLOW_CLEAR bit (bsc#1223207).
- CVE-2024-26901: Fixed do_sys_name_to_handle() to use kzalloc() to prevent kernel-infoleak (bsc#1223198).
- CVE-2024-26898: Fixed aoe potential use-after-free problem in aoecmd_cfg_pkts (bsc#1223016).
- CVE-2024-26896: Fixed wifi/wfx memory leak when starting AP (bsc#1223042).
- CVE-2024-26893: Fixed firmware/arm_scmi for possible double free in SMC transport cleanup path (bsc#1223196).
- CVE-2024-26885: Fixed bpf DEVMAP_HASH overflow check on 32-bit arches (bsc#1223190).
- CVE-2024-26884: Fixed bpf hashtab overflow check on 32-bit arches (bsc#1223189).
- CVE-2024-26883: Fixed bpf stackmap overflow check on 32-bit arches (bsc#1223035).
- CVE-2024-26882: Fixed net/ip_tunnel to make sure to pull inner header in ip_tunnel_rcv() (bsc#1223034).
- CVE-2024-26881: Fixed net/hns3 kernel crash when 1588 is received on HIP08 devices (bsc#1223041).
- CVE-2024-26879: Fixed clk/meson by adding missing clocks to axg_clk_regmaps (bsc#1223066).
- CVE-2024-26878: Fixed quota for potential NULL pointer dereference (bsc#1223060).
- CVE-2024-26876: Fixed drm/bridge/adv7511 crash on irq during probe (bsc#1223119).
- CVE-2024-26866: Fixed spi/spi-fsl-lpspi by removing redundant spi_controller_put call (bsc#1223024).
- CVE-2024-26862: Fixed packet annotate data-races around ignore_outgoing (bsc#1223111).
- CVE-2024-26861: Fixed wireguard/receive annotate data-race around receiving_counter.counter (bsc#1223076).
- CVE-2024-26857: Fixed geneve to make sure to pull inner header in geneve_rx() (bsc#1223058).
- CVE-2024-26856: Fixed use-after-free inside sparx5_del_mact_entry (bsc#1223052).
- CVE-2024-26855: Fixed net/ice potential NULL pointer dereference in ice_bridge_setlink() (bsc#1223051).
- CVE-2024-26853: Fixed igc returning frame twice in XDP_REDIRECT (bsc#1223061).
- CVE-2024-26852: Fixed net/ipv6 to avoid possible UAF in ip6_route_mpath_notify() (bsc#1223057).
- CVE-2024-26840: Fixed a memory leak in cachefiles_add_cache() (bsc#1222976).
- CVE-2024-26836: Fixed platform/x86/think-lmi password opcode ordering for workstations (bsc#1222968).
- CVE-2024-26830: Fixed i40e to not allow untrusted VF to remove administratively set MAC (bsc#1223012).
- CVE-2024-26817: Fixed amdkfd to use calloc instead of kzalloc to avoid integer overflow (bsc#1222812).
- CVE-2024-26816: Fixed relocations in .notes section when building with CONFIG_XEN_PV=y by ignoring them (bsc#1222624).
- CVE-2024-26791: Fixed btrfs/dev-replace properly validate device names (bsc#1222793).
- CVE-2024-26783: Fixed mm/vmscan bug when calling wakeup_kswapd() with a wrong zone index (bsc#1222615).
- CVE-2024-26773: Fixed ext4 block allocation from corrupted group in ext4_mb_try_best_found() (bsc#1222618).
- CVE-2024-26772: Fixed ext4 to avoid allocating blocks from corrupted group in ext4_mb_find_by_goal() (bsc#1222613).
- CVE-2024-26766: Fixed SDMA off-by-one error in _pad_sdma_tx_descs() (bsc#1222726).
- CVE-2024-26764: Fixed IOCB_AIO_RW check in fs/aio before the struct aio_kiocb conversion (bsc#1222721).
- CVE-2024-26733: Fixed an overflow in arp_req_get() in arp (bsc#1222585).
- CVE-2024-26700: Fixed drm/amd/display MST Null pointer dereference  for RV (bsc#1222870).
- CVE-2024-26687: Fixed xen/events close evtchn after mapping cleanup (bsc#1222435).
- CVE-2024-26679: Fixed inet read sk->sk_family once in inet_recv_error() (bsc#1222385).
- CVE-2024-26675: Fixed ppp_async to limit MRU to 64K (bsc#1222379).
- CVE-2024-26673: Fixed netfilter/nft_ct layer 3 and 4 protocol sanitization (bsc#1222368).
- CVE-2024-26671: Fixed blk-mq IO hang from sbitmap wakeup race (bsc#1222357).
- CVE-2024-26656: Fixed drm/amdgpu use-after-free bug (bsc#1222307).
- CVE-2024-26610: Fixed memory corruption in wifi/iwlwifi (bsc#1221299).
- CVE-2024-26601: Fixed ext4 buddy bitmap corruption via fast commit replay (bsc#1220342).
- CVE-2024-23850: Fixed double free of anonymous device after snapshot  creation failure (bsc#1219126).
- CVE-2024-23848: Fixed media/cec for possible use-after-free in cec_queue_msg_fh (bsc#1219104).
- CVE-2024-23307: Fixed Integer Overflow or Wraparound vulnerability in x86 and ARM md, raid, raid5 modules (bsc#1219169).
- CVE-2024-22099: Fixed a null-pointer-dereference in rfcomm_check_security (bsc#1219170).
- CVE-2024-2201: Fixed information leak in x86/BHI (bsc#1217339).
- CVE-2024-0841: Fixed a null pointer dereference in the hugetlbfs_fill_super function in hugetlbfs (HugeTLB pages) functionality (bsc#1219264).
- CVE-2024-0639: Fixed a denial-of-service vulnerability due to a deadlock found in sctp_auto_asconf_init in net/sctp/socket.c (bsc#1218917).
- CVE-2023-6270: Fixed a use-after-free issue in aoecmd_cfg_pkts (bsc#1218562).
- CVE-2023-52652: Fixed NTB for possible name leak in ntb_register_device() (bsc#1223686).
- CVE-2023-52645: Fixed pmdomain/mediatek race conditions with genpd (bsc#1223033).
- CVE-2023-52635: Fixed PM/devfreq to synchronize devfreq_monitor_[start/stop] (bsc#1222294).
- CVE-2023-52620: Fixed netfilter/nf_tables to disallow timeout for anonymous sets never used from userspace (bsc#1221825).
- CVE-2023-52616: Fixed unexpected pointer access in crypto/lib/mpi in mpi_ec_init (bsc#1221612).
- CVE-2023-52614: Fixed PM/devfreq buffer overflow in trans_stat_show (bsc#1221617).
- CVE-2023-52593: Fixed wifi/wfx possible NULL pointer dereference in wfx_set_mfp_ap() (bsc#1221042).
- CVE-2023-52591: Fixed a possible reiserfs filesystem corruption via directory renaming (bsc#1221044).
- CVE-2023-52590: Fixed a possible ocfs2 filesystem corruption via directory renaming (bsc#1221088).
- CVE-2023-52589: Fixed media/rkisp1 IRQ disable race issue (bsc#1221084).
- CVE-2023-52585: Fixed drm/amdgpu for possible NULL pointer dereference in amdgpu_ras_query_error_status_helper() (bsc#1221080).
- CVE-2022-48662: Fixed a general protection fault (GPF) in i915_perf_open_ioctl (bsc#1223505).
- CVE-2022-48659: Fixed mm/slub to return errno if kmalloc() fails (bsc#1223498).
- CVE-2022-48658: Fixed mm/slub to avoid a problem in flush_cpu_slab()/__free_slab() task context (bsc#1223496).
- CVE-2022-48651: Fixed an out-of-bound bug in ipvlan caused by unset skb->mac_header (bsc#1223513).
- CVE-2022-48642: Fixed netfilter/nf_tables percpu memory leak at nf_tables_addchain() (bsc#1223478).
- CVE-2022-48640: Fixed bonding for possible NULL pointer dereference in bond_rr_gen_slave_id (bsc#1223499).
- CVE-2022-48631: Fixed a bug in ext4, when parsing extents where eh_entries == 0 and eh_depth > 0 (bsc#1223475).
- CVE-2021-47214: Fixed hugetlb/userfaultfd during restore reservation in hugetlb_mcopy_atomic_pte() (bsc#1222710).
- CVE-2021-47211: Fixed a null pointer dereference on pointer cs_desc in usb-audio (bsc#1222869).
- CVE-2021-47207: Fixed a null pointer dereference on pointer block in gus (bsc#1222790).
- CVE-2021-47205: Unregistered clocks/resets when unbinding in sunxi-ng (bsc#1222888).
- CVE-2021-47202: Fixed NULL pointer dereferences in of_thermal_ functions (bsc#1222878)
- CVE-2021-47200: Fixed drm/prime for possible use-after-free in mmap within drm_gem_ttm_mmap() and drm_gem_ttm_mmap() (bsc#1222838).
- CVE-2021-47195: Fixed use-after-free inside SPI via add_lock mutex (bsc#1222832).
- CVE-2021-47185: Fixed a softlockup issue in flush_to_ldisc in tty tty_buffer (bsc#1222669).
- CVE-2021-47184: Fixed NULL pointer dereference on VSI filter sync (bsc#1222666).
The following non-security bugs were fixed:
- ALSA: firewire-lib: handle quirk to calculate payload quadlets as data block counter (stable-fixes).
- ALSA: hda/realtek - Enable audio jacks of Haier Boyue G42 with ALC269VC (stable-fixes).
- ALSA: hda/realtek - Fix inactive headset mic jack (stable-fixes).
- ALSA: hda/realtek: Add quirk for HP SnowWhite laptops (stable-fixes).
- ALSA: hda/realtek: Fix mute led of HP Laptop 15-da3001TU (stable-fixes).
- ALSA: hda: intel-sdw-acpi: fix usage of device_get_named_child_node() (git-fixes).
- ALSA: scarlett2: Add Focusrite Clarett 2Pre and 4Pre USB support (stable-fixes).
- ALSA: scarlett2: Add Focusrite Clarett+ 2Pre and 4Pre support (stable-fixes).
- ALSA: scarlett2: Add correct product series name to messages (stable-fixes).
- ALSA: scarlett2: Add support for Clarett 8Pre USB (stable-fixes).
- ALSA: scarlett2: Default mixer driver to enabled (stable-fixes).
- ALSA: scarlett2: Move USB IDs out from device_info struct (stable-fixes).
- ASoC: meson: axg-card: make links nonatomic (git-fixes).
- ASoC: meson: axg-tdm-interface: manage formatters in trigger (git-fixes).
- ASoC: meson: cards: select SND_DYNAMIC_MINORS (git-fixes).
- ASoC: soc-core.c: Skip dummy codec when adding platforms (stable-fixes).
- ASoC: tegra: Fix DSPK 16-bit playback (git-fixes).
- ASoC: ti: davinci-mcasp: Fix race condition during probe (git-fixes).
- Bluetooth: Add new quirk for broken read key length on ATS2851 (git-fixes).
- Bluetooth: Fix TOCTOU in HCI debugfs implementation (git-fixes).
- Bluetooth: Fix memory leak in hci_req_sync_complete() (git-fixes).
- Bluetooth: Fix type of len in {l2cap,sco}_sock_getsockopt_old() (stable-fixes).
- Bluetooth: L2CAP: Fix not validating setsockopt user input (git-fixes).
- Bluetooth: RFCOMM: Fix not validating setsockopt user input (git-fixes).
- Bluetooth: SCO: Fix not validating setsockopt user input (git-fixes).
- Bluetooth: add quirk for broken address properties (git-fixes).
- Bluetooth: btintel: Fix null ptr deref in btintel_read_version (stable-fixes).
- Bluetooth: btintel: Fixe build regression (git-fixes).
- Bluetooth: btusb: Add Realtek RTL8852BE support ID 0x0bda:0x4853 (stable-fixes).
- Bluetooth: hci_event: Fix sending HCI_OP_READ_ENC_KEY_SIZE (git-fixes).
- Bluetooth: hci_event: set the conn encrypted before conn establishes (stable-fixes).
- Bluetooth: hci_sock: Fix not validating setsockopt user input (git-fixes).
- Bluetooth: qca: fix NULL-deref on non-serdev suspend (git-fixes).
- Documentation: Add missing documentation for EXPORT_OP flags (stable-fixes).
- HID: intel-ish-hid: ipc: Fix dev_err usage with uninitialized dev->devc (git-fixes).
- HID: logitech-dj: allow mice to use all types of reports (git-fixes).
- HID: uhid: Use READ_ONCE()/WRITE_ONCE() for ->running (stable-fixes).
- Input: allocate keycode for Display refresh rate toggle (stable-fixes).
- Input: synaptics-rmi4 - fail probing if memory allocation for 'phys' fails (stable-fixes).
- NFC: trf7970a: disable all regulators on removal (git-fixes).
- PCI: rpaphp: Error out on busy status from get-sensor-state (bsc#1223369 ltc#205888).
- RDMA/cm: Print the old state when cm_destroy_id gets timeout (git-fixes).
- Reapply 'drm/qxl: simplify qxl_fence_wait' (stable-fixes).
- Revert 'ACPI: PM: Block ASUS B1400CEAE from suspend to idle by default' (stable-fixes).
- Revert 'drm/qxl: simplify qxl_fence_wait' (git-fixes).
- Revert 'ice: Fix ice VF reset during iavf initialization (jsc#PED-376).' (bsc#1223275)
- Revert 'usb: cdc-wdm: close race between read and workqueue' (git-fixes).
- Revert 'usb: phy: generic: Get the vbus supply' (git-fixes).
- USB: UAS: return ENODEV when submit urbs fail with device not attached (stable-fixes).
- USB: core: Add hub_get() and hub_put() routines (git-fixes).
- USB: core: Fix access violation during port device removal (git-fixes).
- USB: core: Fix deadlock in port 'disable' sysfs attribute (git-fixes).
- USB: serial: add device ID for VeriFone adapter (stable-fixes).
- USB: serial: cp210x: add ID for MGP Instruments PDS100 (stable-fixes).
- USB: serial: cp210x: add pid/vid for TDK NC0110013M and MM0110113M (stable-fixes).
- USB: serial: ftdi_sio: add support for GMC Z216C Adapter IR-USB (stable-fixes).
- USB: serial: option: add Fibocom FM135-GL variants (stable-fixes).
- USB: serial: option: add Lonsung U8300/U9300 product (stable-fixes).
- USB: serial: option: add MeiG Smart SLM320 product (stable-fixes).
- USB: serial: option: add Rolling RW101-GL and RW135-GL support (stable-fixes).
- USB: serial: option: add Telit FN920C04 rmnet compositions (stable-fixes).
- USB: serial: option: add support for Fibocom FM650/FG650 (stable-fixes).
- USB: serial: option: support Quectel EM060K sub-models (stable-fixes).
- nfsd: Fixed mount kerberized nfs4 share issue (git-fixes bsc#1223858).
- s390: Fixed kernel backtrack (bsc#1141539 git-fixes).
- nfsd: Fixed mount issue with KOTD (bsc#1223380 bsc#1217408 bsc#1223640).
- s390: Fixed LPM of lpar failure with error HSCLA2CF in 19th loops (jsc#PED-542 git-fixes bsc#1213573 ltc#203238).
- ahci: asm1064: asm1166: do not limit reported ports (git-fixes).
- ahci: asm1064: correct count of reported ports (stable-fixes).
- arm64: dts: imx8-ss-conn: fix usdhc wrong lpcg clock order (git-fixes)
- arm64: dts: rockchip: Remove unsupported node from the Pinebook Pro (git-fixes)
- arm64: dts: rockchip: enable internal pull-up for Q7_THRM# on RK3399 (git-fixes)
- arm64: dts: rockchip: enable internal pull-up on PCIE_WAKE# for (git-fixes)
- arm64: dts: rockchip: enable internal pull-up on Q7_USB_ID for RK3399 (git-fixes)
- arm64: dts: rockchip: fix rk3328 hdmi ports node (git-fixes)
- arm64: dts: rockchip: fix rk3399 hdmi ports node (git-fixes)
- arm64: hibernate: Fix level3 translation fault in swsusp_save() (git-fixes).
- ax25: fix use-after-free bugs caused by ax25_ds_del_timer (git-fixes).
- batman-adv: Avoid infinite loop trying to resize local TT (git-fixes).
- clk: Get runtime PM before walking tree during disable_unused (git-fixes).
- clk: Initialize struct clk_core kref earlier (stable-fixes).
- clk: Mark 'all_lists' as const (stable-fixes).
- clk: Print an info line before disabling unused clocks (stable-fixes).
- clk: Remove prepare_lock hold assertion in __clk_release() (git-fixes).
- clk: remove extra empty line (stable-fixes).
- comedi: vmk80xx: fix incomplete endpoint checking (git-fixes).
- dma: xilinx_dpdma: Fix locking (git-fixes).
- dmaengine: idxd: Fix oops during rmmod on single-CPU platforms (git-fixes).
- dmaengine: owl: fix register access functions (git-fixes).
- dmaengine: tegra186: Fix residual calculation (git-fixes).
- docs: Document the FAN_FS_ERROR event (stable-fixes).
- drm-print: add drm_dbg_driver to improve namespace symmetry (stable-fixes).
- drm/amd/display: Do not recursively call manual trigger programming (stable-fixes).
- drm/amd/display: Fix nanosec stat overflow (stable-fixes).
- drm/amd/display: fix disable otg wa logic in DCN316 (stable-fixes).
- drm/amd/pm: fixes a random hang in S4 for SMU v13.0.4/11 (stable-fixes).
- drm/amdgpu/sdma5.2: use legacy HDP flush for SDMA2/3 (stable-fixes).
- drm/amdgpu: Fix leak when GPU memory allocation fails (stable-fixes).
- drm/amdgpu: Reset dGPU if suspend got aborted (stable-fixes).
- drm/amdgpu: always force full reset for SOC21 (stable-fixes).
- drm/amdgpu: fix incorrect active rb bitmap for gfx11 (stable-fixes).
- drm/amdgpu: fix incorrect number of active RBs for gfx11 (stable-fixes).
- drm/amdgpu: once more fix the call oder in amdgpu_ttm_move() v2 (git-fixes).
- drm/amdgpu: validate the parameters of bo mapping operations more clearly (git-fixes).
- drm/amdkfd: Reset GPU on queue preemption failure (stable-fixes).
- drm/ast: Fix soft lockup (git-fixes).
- drm/client: Fully protect modes[] with dev->mode_config.mutex (stable-fixes).
- drm/i915/cdclk: Fix CDCLK programming order when pipes are active (git-fixes).
- drm/i915/vrr: Disable VRR when using bigjoiner (stable-fixes).
- drm/i915: Disable port sync when bigjoiner is used (stable-fixes).
- drm/msm/dp: fix typo in dp_display_handle_port_status_changed() (git-fixes).
- drm/nouveau/nvkm: add a replacement for nvkm_notify (bsc#1223834)
- drm/panel: ili9341: Respect deferred probe (git-fixes).
- drm/panel: ili9341: Use predefined error codes (git-fixes).
- drm/panel: visionox-rm69299: do not unregister DSI device (git-fixes).
- drm/vc4: do not check if plane->state->fb == state->fb (stable-fixes).
- drm/vmwgfx: Enable DMA mappings with SEV (git-fixes).
- drm/vmwgfx: Fix crtc's atomic check conditional (git-fixes).
- drm/vmwgfx: Fix invalid reads in fence signaled events (git-fixes).
- drm/vmwgfx: Sort primary plane formats by order of preference (git-fixes).
- drm: nv04: Fix out of bounds access (git-fixes).
- drm: panel-orientation-quirks: Add quirk for GPD Win Mini (stable-fixes).
- drm: panel-orientation-quirks: Add quirk for Lenovo Legion Go (stable-fixes).
- dump_stack: Do not get cpu_sync for panic CPU (bsc#1223574).
- fbdev: fix incorrect address computation in deferred IO (git-fixes).
- fbdev: viafb: fix typo in hw_bitblt_1 and hw_bitblt_2 (stable-fixes).
- fbmon: prevent division by zero in fb_videomode_from_videomode() (stable-fixes).
- fuse: do not unhash root (bsc#1223951).
- fuse: fix root lookup with nonzero generation (bsc#1223950).
- hwmon: (amc6821) add of_match table (stable-fixes).
- i2c: pxa: hide unused icr_bits[] variable (git-fixes).
- i2c: smbus: fix NULL function pointer dereference (git-fixes).
- i40e: Fix VF MAC filter removal (git-fixes).
- idma64: Do not try to serve interrupts when device is powered off (git-fixes).
- iio: accel: mxc4005: Interrupt handling fixes (git-fixes).
- iio:imu: adis16475: Fix sync mode setting (git-fixes).
- init/main.c: Fix potential static_command_line memory overflow (git-fixes).
- ipv6/addrconf: fix a potential refcount underflow for idev (git-fixes).
- irqchip/gic-v3-its: Prevent double free on error (git-fixes).
- kprobes: Fix possible use-after-free issue on kprobe registration (git-fixes).
- livepatch: Fix missing newline character in klp_resolve_symbols() (bsc#1223539).
- media: cec: core: remove length check of Timer Status (stable-fixes).
- media: sta2x11: fix irq handler cast (stable-fixes).
- mei: me: add arrow lake point H DID (stable-fixes).
- mei: me: add arrow lake point S DID (stable-fixes).
- mei: me: disable RPL-S on SPS and IGN firmwares (git-fixes).
- mm/vmscan: make sure wakeup_kswapd with managed zone (bsc#1223473).
- mmc: sdhci-msm: pervent access to suspended controller (git-fixes).
- mtd: diskonchip: work around ubsan link failure (stable-fixes).
- net: bridge: vlan: fix memory leak in __allowed_ingress (git-fixes).
- net: fix a memleak when uncloning an skb dst and its metadata (git-fixes).
- net: fix skb leak in __skb_tstamp_tx() (git-fixes).
- net: ipv6: ensure we call ipv6_mc_down() at most once (git-fixes).
- net: mld: fix reference count leak in mld_{query | report}_work() (git-fixes).
- net: stream: purge sk_error_queue in sk_stream_kill_queues() (git-fixes).
- net: usb: ax88179_178a: avoid writing the mac address before first reading (git-fixes).
- net: usb: ax88179_178a: stop lying about skb->truesize (git-fixes).
- net: vlan: fix underflow for the real_dev refcnt (git-fixes).
- net: vmxnet3: Fix NULL pointer dereference in vmxnet3_rq_rx_complete() (bsc#1223360).
- netfilter: br_netfilter: Drop dst references before setting (git-fixes).
- netfilter: ipt_CLUSTERIP: fix refcount leak in clusterip_tg_check() (git-fixes).
- netfilter: nft_ct: fix l3num expectations with inet pseudo family (git-fixes).
- nfsd: use __fput_sync() to avoid delayed closing of files (bsc#1223380 bsc#1217408).
- nilfs2: fix OOB in nilfs_set_de_type (git-fixes).
- nilfs2: fix OOB in nilfs_set_de_type (git-fixes).
- nouveau: fix function cast warning (git-fixes).
- nouveau: fix instmem race condition around ptr stores (git-fixes).
- phy: tegra: xusb: Add API to retrieve the port number of phy (stable-fixes).
- pinctrl: renesas: checker: Limit cfg reg enum checks to provided IDs (stable-fixes).
- platform/x86: intel-vbtn: Update tablet mode switch at end of probe (git-fixes).
- platform/x86: touchscreen_dmi: Add an extra entry for a variant of the Chuwi Vi8 tablet (stable-fixes).
- powerpc/kasan: Do not instrument non-maskable or raw interrupts (bsc#1223191).
- powerpc/rtas: define pr_fmt and convert printk call sites (bsc#1223369 ltc#205888).
- powerpc/rtas: export rtas_error_rc() for reuse (bsc#1223369 ltc#205888).
- powerpc: Avoid nmi_enter/nmi_exit in real mode interrupt (bsc#1221645 ltc#205739 bsc#1223191).
- powerpc: Refactor verification of MSR_RI (bsc#1223191).
- printk: Add this_cpu_in_panic() (bsc#1223574).
- printk: Adjust mapping for 32bit seq macros (bsc#1223574).
- printk: Avoid non-panic CPUs writing to ringbuffer (bsc#1223574).
- printk: Disable passing console lock owner completely during panic() (bsc#1223574).
- printk: Drop console_sem during panic (bsc#1223574).
- printk: Rename abandon_console_lock_in_panic() to other_cpu_in_panic() (bsc#1223574).
- printk: Use prb_first_seq() as base for 32bit seq macros (bsc#1223574).
- printk: Wait for all reserved records with pr_flush() (bsc#1223574).
- printk: nbcon: Relocate 32bit seq macros (bsc#1223574).
- printk: ringbuffer: Clarify special lpos values (bsc#1223574).
- printk: ringbuffer: Cleanup reader terminology (bsc#1223574).
- printk: ringbuffer: Do not skip non-finalized records with prb_next_seq() (bsc#1223574).
- printk: ringbuffer: Improve prb_next_seq() performance (bsc#1223574).
- printk: ringbuffer: Skip non-finalized records in panic (bsc#1223574).
- pstore/zone: Add a null pointer check to the psz_kmsg_read (stable-fixes).
- ring-buffer: Only update pages_touched when a new page is touched (git-fixes).
- ring-buffer: use READ_ONCE() to read cpu_buffer->commit_page in concurrent environment (git-fixes).
- s390/cio: Ensure the copied buf is NUL terminated (git-fixes bsc#1223875).
- s390/decompressor: fix misaligned symbol build error (git-fixes bsc#1223785).
- s390/mm: Fix clearing storage keys for huge pages (git-fixes bsc#1223877).
- s390/mm: Fix storage key clearing for guest huge pages (git-fixes bsc#1223878).
- s390/qeth: Fix kernel panic after setting hsuid (git-fixes bsc#1223879).
- s390/scm: fix virtual vs physical address confusion (git-fixes bsc#1223784).
- s390/vdso: Add CFI for RA register to asm macro vdso_func (git-fixes bsc#1223876).
- s390/vdso: drop '-fPIC' from LDFLAGS (git-fixes bsc#1223598).
- s390/zcrypt: fix reference counting on zcrypt card objects (git-fixes bsc#1223595).
- serial/pmac_zilog: Remove flawed mitigation for rx irq flood (git-fixes).
- serial: core: Provide port lock wrappers (stable-fixes).
- serial: core: fix kernel-doc for uart_port_unlock_irqrestore() (git-fixes).
- serial: mxs-auart: add spinlock around changing cts state (git-fixes).
- slimbus: qcom-ngd-ctrl: Add timeout for wait operation (git-fixes).
- speakup: Avoid crash on very long word (git-fixes).
- speakup: Fix 8bit characters from direct synth (git-fixes).
- spi: hisi-kunpeng: Delete the dump interface of data registers in debugfs (git-fixes).
- tcp/udp: Fix memleaks of sk and zerocopy skbs with TX timestamp (git-fixes).
- thunderbolt: Avoid notify PM core about runtime PM resume (stable-fixes).
- thunderbolt: Fix wake configurations after device unplug (stable-fixes).
- tracing/net_sched: Fix tracepoints that save qdisc_dev() as a string (git-fixes).
- tracing: Show size of requested perf buffer (git-fixes).
- usb: Disable USB3 LPM at shutdown (stable-fixes).
- usb: Fix regression caused by invalid ep0 maxpacket in virtual SuperSpeed device (git-fixes).
- usb: dwc2: host: Fix dereference issue in DDMA completion flow (git-fixes).
- usb: dwc3: core: Prevent phy suspend during init (Git-fixes).
- usb: gadget: composite: fix OS descriptors w_value logic (git-fixes).
- usb: gadget: f_fs: Fix a race condition when processing setup packets (git-fixes).
- usb: gadget: f_ncm: Fix UAF ncm object at re-bind after usb ep transport error (stable-fixes).
- usb: gadget: tegra-xudc: Fix USB3 PHY retrieval logic (git-fixes).
- usb: ohci: Prevent missed ohci interrupts (git-fixes).
- usb: sl811-hcd: only defined function checkdone if QUIRK2 is defined (stable-fixes).
- usb: typec: tcpci: add generic tcpci fallback compatible (stable-fixes).
- usb: typec: tcpm: Check for port partner validity before consuming it (git-fixes).
- usb: typec: tcpm: unregister existing source caps before re-registration (bsc#1220569).
- usb: typec: ucsi: Ack unsupported commands (stable-fixes).
- usb: typec: ucsi: Clear UCSI_CCI_RESET_COMPLETE before reset (stable-fixes).
- usb: typec: ucsi: Fix connector check on init (git-fixes).
- usb: udc: remove warning when queue disabled ep (stable-fixes).
- virtio: treat alloc_dax() -EOPNOTSUPP failure as non-fatal (bsc#1223949).
- wifi: ath9k: fix LNA selection in ath_ant_try_scan() (stable-fixes).
- wifi: iwlwifi: mvm: remove old PASN station when adding a new one (git-fixes).
- wifi: iwlwifi: mvm: return uid from iwl_mvm_build_scan_cmd (git-fixes).
- wifi: mac80211: check/clear fast rx for non-4addr sta VLAN changes (stable-fixes).
- wifi: nl80211: do not free NULL coalescing rule (git-fixes).
- x86/bugs: Cache the value of MSR_IA32_ARCH_CAPABILITIES (git-fixes).
- x86/bugs: Fix BHI documentation (git-fixes).
- x86/bugs: Fix BHI handling of RRSBA (git-fixes).
- x86/bugs: Fix BHI retpoline check (git-fixes).
- x86/bugs: Fix return type of spectre_bhi_state() (git-fixes).
- x86/bugs: Rename various 'ia32_cap' variables to 'x86_arch_cap_msr' (git-fixes).
- x86/cpufeatures: Fix dependencies for GFNI, VAES, and VPCLMULQDQ (git-fixes).
- x86/mm: Ensure input to pfn_to_kaddr() is treated as a 64-bit type (jsc#PED-7167 git-fixes).
- x86/sev: Skip ROM range scans and validation for SEV-SNP guests (jsc#PED-7167 git-fixes).
- xfrm6: fix inet6_dev refcount underflow problem (git-fixes).
    Patchnames
SUSE-2024-1644,SUSE-SLE-Module-Public-Cloud-15-SP5-2024-1644,openSUSE-SLE-15.5-2024-1644
    Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
    {
  "document": {
    "aggregate_severity": {
      "namespace": "https://www.suse.com/support/security/rating/",
      "text": "important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright 2024 SUSE LLC. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Security update for the Linux Kernel",
        "title": "Title of the patch"
      },
      {
        "category": "description",
        "text": "\nThe SUSE Linux Enterprise 15 SP5 Azure kernel was updated to receive various security bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2024-27389: Fixed pstore inode handling with d_invalidate() (bsc#1223705).\n- CVE-2024-27062: Fixed nouveau lock inside client object tree (bsc#1223834).\n- CVE-2024-27056: Fixed wifi/iwlwifi/mvm to ensure offloading TID queue exists (bsc#1223822).\n- CVE-2024-27046: Fixed nfp/flower handling acti_netdevs allocation failure (bsc#1223827).\n- CVE-2024-27043: Fixed a use-after-free in edia/dvbdev in different places (bsc#1223824).\n- CVE-2024-27042: Fixed drm/amdgpu for potential out-of-bounds access in amdgpu_discovery_reg_base_init() (bsc#1223823).\n- CVE-2024-27041: Fixed drm/amd/display NULL checks for adev-\u003edm.dc in amdgpu_dm_fini() (bsc#1223714).\n- CVE-2024-27039: Fixed clk/hisilicon/hi3559a an erroneous devm_kfree() (bsc#1223821).\n- CVE-2024-27038: Fixed clk_core_get NULL pointer dereference (bsc#1223816).\n- CVE-2024-27030: Fixed octeontx2-af to use separate handlers for interrupts (bsc#1223790).\n- CVE-2024-27014: Fixed net/mlx5e to prevent deadlock while disabling aRFS (bsc#1223735).\n- CVE-2024-27013: Fixed tun limit printing rate when illegal packet received by tun device (bsc#1223745).\n- CVE-2024-26993: Fixed fs/sysfs reference leak in sysfs_break_active_protection() (bsc#1223693).\n- CVE-2024-26982: Fixed Squashfs inode number check not to be an invalid value of zero (bsc#1223634).\n- CVE-2024-26970: Fixed clk/qcom/gcc-ipq6018 termination of frequency table arrays (bsc#1223644).\n- CVE-2024-26969: Fixed clk/qcom/gcc-ipq8074 termination of frequency table arrays (bsc#1223645).\n- CVE-2024-26966: Fixed clk/qcom/mmcc-apq8084 termination of frequency table arrays (bsc#1223646).\n- CVE-2024-26965: Fixed clk/qcom/mmcc-msm8974 termination of frequency table arrays (bsc#1223648).\n- CVE-2024-26960: Fixed mm/swap race between free_swap_and_cache() and swapoff() (bsc#1223655).\n- CVE-2024-26951: Fixed wireguard/netlink check for dangling peer via is_dead instead of empty list (bsc#1223660).\n- CVE-2024-26950: Fixed wireguard/netlink to access device through ctx instead of peer (bsc#1223661).\n- CVE-2024-26948: Fixed drm/amd/display by adding dc_state NULL check in dc_state_release (bsc#1223664).\n- CVE-2024-26939: Fixed drm/i915/vma UAF on destroy against retire race (bsc#1223679).\n- CVE-2024-26927: Fixed ASoC/SOF bounds checking to firmware data Smatch (bsc#1223525).\n- CVE-2024-26915: Fixed drm/amdgpu reset IH OVERFLOW_CLEAR bit (bsc#1223207).\n- CVE-2024-26901: Fixed do_sys_name_to_handle() to use kzalloc() to prevent kernel-infoleak (bsc#1223198).\n- CVE-2024-26898: Fixed aoe potential use-after-free problem in aoecmd_cfg_pkts (bsc#1223016).\n- CVE-2024-26896: Fixed wifi/wfx memory leak when starting AP (bsc#1223042).\n- CVE-2024-26893: Fixed firmware/arm_scmi for possible double free in SMC transport cleanup path (bsc#1223196).\n- CVE-2024-26885: Fixed bpf DEVMAP_HASH overflow check on 32-bit arches (bsc#1223190).\n- CVE-2024-26884: Fixed bpf hashtab overflow check on 32-bit arches (bsc#1223189).\n- CVE-2024-26883: Fixed bpf stackmap overflow check on 32-bit arches (bsc#1223035).\n- CVE-2024-26882: Fixed net/ip_tunnel to make sure to pull inner header in ip_tunnel_rcv() (bsc#1223034).\n- CVE-2024-26881: Fixed net/hns3 kernel crash when 1588 is received on HIP08 devices (bsc#1223041).\n- CVE-2024-26879: Fixed clk/meson by adding missing clocks to axg_clk_regmaps (bsc#1223066).\n- CVE-2024-26878: Fixed quota for potential NULL pointer dereference (bsc#1223060).\n- CVE-2024-26876: Fixed drm/bridge/adv7511 crash on irq during probe (bsc#1223119).\n- CVE-2024-26866: Fixed spi/spi-fsl-lpspi by removing redundant spi_controller_put call (bsc#1223024).\n- CVE-2024-26862: Fixed packet annotate data-races around ignore_outgoing (bsc#1223111).\n- CVE-2024-26861: Fixed wireguard/receive annotate data-race around receiving_counter.counter (bsc#1223076).\n- CVE-2024-26857: Fixed geneve to make sure to pull inner header in geneve_rx() (bsc#1223058).\n- CVE-2024-26856: Fixed use-after-free inside sparx5_del_mact_entry (bsc#1223052).\n- CVE-2024-26855: Fixed net/ice potential NULL pointer dereference in ice_bridge_setlink() (bsc#1223051).\n- CVE-2024-26853: Fixed igc returning frame twice in XDP_REDIRECT (bsc#1223061).\n- CVE-2024-26852: Fixed net/ipv6 to avoid possible UAF in ip6_route_mpath_notify() (bsc#1223057).\n- CVE-2024-26840: Fixed a memory leak in cachefiles_add_cache() (bsc#1222976).\n- CVE-2024-26836: Fixed platform/x86/think-lmi password opcode ordering for workstations (bsc#1222968).\n- CVE-2024-26830: Fixed i40e to not allow untrusted VF to remove administratively set MAC (bsc#1223012).\n- CVE-2024-26817: Fixed amdkfd to use calloc instead of kzalloc to avoid integer overflow (bsc#1222812).\n- CVE-2024-26816: Fixed relocations in .notes section when building with CONFIG_XEN_PV=y by ignoring them (bsc#1222624).\n- CVE-2024-26791: Fixed btrfs/dev-replace properly validate device names (bsc#1222793).\n- CVE-2024-26783: Fixed mm/vmscan bug when calling wakeup_kswapd() with a wrong zone index (bsc#1222615).\n- CVE-2024-26773: Fixed ext4 block allocation from corrupted group in ext4_mb_try_best_found() (bsc#1222618).\n- CVE-2024-26772: Fixed ext4 to avoid allocating blocks from corrupted group in ext4_mb_find_by_goal() (bsc#1222613).\n- CVE-2024-26766: Fixed SDMA off-by-one error in _pad_sdma_tx_descs() (bsc#1222726).\n- CVE-2024-26764: Fixed IOCB_AIO_RW check in fs/aio before the struct aio_kiocb conversion (bsc#1222721).\n- CVE-2024-26733: Fixed an overflow in arp_req_get() in arp (bsc#1222585).\n- CVE-2024-26700: Fixed drm/amd/display MST Null pointer dereference  for RV (bsc#1222870).\n- CVE-2024-26687: Fixed xen/events close evtchn after mapping cleanup (bsc#1222435).\n- CVE-2024-26679: Fixed inet read sk-\u003esk_family once in inet_recv_error() (bsc#1222385).\n- CVE-2024-26675: Fixed ppp_async to limit MRU to 64K (bsc#1222379).\n- CVE-2024-26673: Fixed netfilter/nft_ct layer 3 and 4 protocol sanitization (bsc#1222368).\n- CVE-2024-26671: Fixed blk-mq IO hang from sbitmap wakeup race (bsc#1222357).\n- CVE-2024-26656: Fixed drm/amdgpu use-after-free bug (bsc#1222307).\n- CVE-2024-26610: Fixed memory corruption in wifi/iwlwifi (bsc#1221299).\n- CVE-2024-26601: Fixed ext4 buddy bitmap corruption via fast commit replay (bsc#1220342).\n- CVE-2024-23850: Fixed double free of anonymous device after snapshot  creation failure (bsc#1219126).\n- CVE-2024-23848: Fixed media/cec for possible use-after-free in cec_queue_msg_fh (bsc#1219104).\n- CVE-2024-23307: Fixed Integer Overflow or Wraparound vulnerability in x86 and ARM md, raid, raid5 modules (bsc#1219169).\n- CVE-2024-22099: Fixed a null-pointer-dereference in rfcomm_check_security (bsc#1219170).\n- CVE-2024-2201: Fixed information leak in x86/BHI (bsc#1217339).\n- CVE-2024-0841: Fixed a null pointer dereference in the hugetlbfs_fill_super function in hugetlbfs (HugeTLB pages) functionality (bsc#1219264).\n- CVE-2024-0639: Fixed a denial-of-service vulnerability due to a deadlock found in sctp_auto_asconf_init in net/sctp/socket.c (bsc#1218917).\n- CVE-2023-6270: Fixed a use-after-free issue in aoecmd_cfg_pkts (bsc#1218562).\n- CVE-2023-52652: Fixed NTB for possible name leak in ntb_register_device() (bsc#1223686).\n- CVE-2023-52645: Fixed pmdomain/mediatek race conditions with genpd (bsc#1223033).\n- CVE-2023-52635: Fixed PM/devfreq to synchronize devfreq_monitor_[start/stop] (bsc#1222294).\n- CVE-2023-52620: Fixed netfilter/nf_tables to disallow timeout for anonymous sets never used from userspace (bsc#1221825).\n- CVE-2023-52616: Fixed unexpected pointer access in crypto/lib/mpi in mpi_ec_init (bsc#1221612).\n- CVE-2023-52614: Fixed PM/devfreq buffer overflow in trans_stat_show (bsc#1221617).\n- CVE-2023-52593: Fixed wifi/wfx possible NULL pointer dereference in wfx_set_mfp_ap() (bsc#1221042).\n- CVE-2023-52591: Fixed a possible reiserfs filesystem corruption via directory renaming (bsc#1221044).\n- CVE-2023-52590: Fixed a possible ocfs2 filesystem corruption via directory renaming (bsc#1221088).\n- CVE-2023-52589: Fixed media/rkisp1 IRQ disable race issue (bsc#1221084).\n- CVE-2023-52585: Fixed drm/amdgpu for possible NULL pointer dereference in amdgpu_ras_query_error_status_helper() (bsc#1221080).\n- CVE-2022-48662: Fixed a general protection fault (GPF) in i915_perf_open_ioctl (bsc#1223505).\n- CVE-2022-48659: Fixed mm/slub to return errno if kmalloc() fails (bsc#1223498).\n- CVE-2022-48658: Fixed mm/slub to avoid a problem in flush_cpu_slab()/__free_slab() task context (bsc#1223496).\n- CVE-2022-48651: Fixed an out-of-bound bug in ipvlan caused by unset skb-\u003emac_header (bsc#1223513).\n- CVE-2022-48642: Fixed netfilter/nf_tables percpu memory leak at nf_tables_addchain() (bsc#1223478).\n- CVE-2022-48640: Fixed bonding for possible NULL pointer dereference in bond_rr_gen_slave_id (bsc#1223499).\n- CVE-2022-48631: Fixed a bug in ext4, when parsing extents where eh_entries == 0 and eh_depth \u003e 0 (bsc#1223475).\n- CVE-2021-47214: Fixed hugetlb/userfaultfd during restore reservation in hugetlb_mcopy_atomic_pte() (bsc#1222710).\n- CVE-2021-47211: Fixed a null pointer dereference on pointer cs_desc in usb-audio (bsc#1222869).\n- CVE-2021-47207: Fixed a null pointer dereference on pointer block in gus (bsc#1222790).\n- CVE-2021-47205: Unregistered clocks/resets when unbinding in sunxi-ng (bsc#1222888).\n- CVE-2021-47202: Fixed NULL pointer dereferences in of_thermal_ functions (bsc#1222878)\n- CVE-2021-47200: Fixed drm/prime for possible use-after-free in mmap within drm_gem_ttm_mmap() and drm_gem_ttm_mmap() (bsc#1222838).\n- CVE-2021-47195: Fixed use-after-free inside SPI via add_lock mutex (bsc#1222832).\n- CVE-2021-47185: Fixed a softlockup issue in flush_to_ldisc in tty tty_buffer (bsc#1222669).\n- CVE-2021-47184: Fixed NULL pointer dereference on VSI filter sync (bsc#1222666).\n\nThe following non-security bugs were fixed:\n\n- ALSA: firewire-lib: handle quirk to calculate payload quadlets as data block counter (stable-fixes).\n- ALSA: hda/realtek - Enable audio jacks of Haier Boyue G42 with ALC269VC (stable-fixes).\n- ALSA: hda/realtek - Fix inactive headset mic jack (stable-fixes).\n- ALSA: hda/realtek: Add quirk for HP SnowWhite laptops (stable-fixes).\n- ALSA: hda/realtek: Fix mute led of HP Laptop 15-da3001TU (stable-fixes).\n- ALSA: hda: intel-sdw-acpi: fix usage of device_get_named_child_node() (git-fixes).\n- ALSA: scarlett2: Add Focusrite Clarett 2Pre and 4Pre USB support (stable-fixes).\n- ALSA: scarlett2: Add Focusrite Clarett+ 2Pre and 4Pre support (stable-fixes).\n- ALSA: scarlett2: Add correct product series name to messages (stable-fixes).\n- ALSA: scarlett2: Add support for Clarett 8Pre USB (stable-fixes).\n- ALSA: scarlett2: Default mixer driver to enabled (stable-fixes).\n- ALSA: scarlett2: Move USB IDs out from device_info struct (stable-fixes).\n- ASoC: meson: axg-card: make links nonatomic (git-fixes).\n- ASoC: meson: axg-tdm-interface: manage formatters in trigger (git-fixes).\n- ASoC: meson: cards: select SND_DYNAMIC_MINORS (git-fixes).\n- ASoC: soc-core.c: Skip dummy codec when adding platforms (stable-fixes).\n- ASoC: tegra: Fix DSPK 16-bit playback (git-fixes).\n- ASoC: ti: davinci-mcasp: Fix race condition during probe (git-fixes).\n- Bluetooth: Add new quirk for broken read key length on ATS2851 (git-fixes).\n- Bluetooth: Fix TOCTOU in HCI debugfs implementation (git-fixes).\n- Bluetooth: Fix memory leak in hci_req_sync_complete() (git-fixes).\n- Bluetooth: Fix type of len in {l2cap,sco}_sock_getsockopt_old() (stable-fixes).\n- Bluetooth: L2CAP: Fix not validating setsockopt user input (git-fixes).\n- Bluetooth: RFCOMM: Fix not validating setsockopt user input (git-fixes).\n- Bluetooth: SCO: Fix not validating setsockopt user input (git-fixes).\n- Bluetooth: add quirk for broken address properties (git-fixes).\n- Bluetooth: btintel: Fix null ptr deref in btintel_read_version (stable-fixes).\n- Bluetooth: btintel: Fixe build regression (git-fixes).\n- Bluetooth: btusb: Add Realtek RTL8852BE support ID 0x0bda:0x4853 (stable-fixes).\n- Bluetooth: hci_event: Fix sending HCI_OP_READ_ENC_KEY_SIZE (git-fixes).\n- Bluetooth: hci_event: set the conn encrypted before conn establishes (stable-fixes).\n- Bluetooth: hci_sock: Fix not validating setsockopt user input (git-fixes).\n- Bluetooth: qca: fix NULL-deref on non-serdev suspend (git-fixes).\n- Documentation: Add missing documentation for EXPORT_OP flags (stable-fixes).\n- HID: intel-ish-hid: ipc: Fix dev_err usage with uninitialized dev-\u003edevc (git-fixes).\n- HID: logitech-dj: allow mice to use all types of reports (git-fixes).\n- HID: uhid: Use READ_ONCE()/WRITE_ONCE() for -\u003erunning (stable-fixes).\n- Input: allocate keycode for Display refresh rate toggle (stable-fixes).\n- Input: synaptics-rmi4 - fail probing if memory allocation for \u0027phys\u0027 fails (stable-fixes).\n- NFC: trf7970a: disable all regulators on removal (git-fixes).\n- PCI: rpaphp: Error out on busy status from get-sensor-state (bsc#1223369 ltc#205888).\n- RDMA/cm: Print the old state when cm_destroy_id gets timeout (git-fixes).\n- Reapply \u0027drm/qxl: simplify qxl_fence_wait\u0027 (stable-fixes).\n- Revert \u0027ACPI: PM: Block ASUS B1400CEAE from suspend to idle by default\u0027 (stable-fixes).\n- Revert \u0027drm/qxl: simplify qxl_fence_wait\u0027 (git-fixes).\n- Revert \u0027ice: Fix ice VF reset during iavf initialization (jsc#PED-376).\u0027 (bsc#1223275)\n- Revert \u0027usb: cdc-wdm: close race between read and workqueue\u0027 (git-fixes).\n- Revert \u0027usb: phy: generic: Get the vbus supply\u0027 (git-fixes).\n- USB: UAS: return ENODEV when submit urbs fail with device not attached (stable-fixes).\n- USB: core: Add hub_get() and hub_put() routines (git-fixes).\n- USB: core: Fix access violation during port device removal (git-fixes).\n- USB: core: Fix deadlock in port \u0027disable\u0027 sysfs attribute (git-fixes).\n- USB: serial: add device ID for VeriFone adapter (stable-fixes).\n- USB: serial: cp210x: add ID for MGP Instruments PDS100 (stable-fixes).\n- USB: serial: cp210x: add pid/vid for TDK NC0110013M and MM0110113M (stable-fixes).\n- USB: serial: ftdi_sio: add support for GMC Z216C Adapter IR-USB (stable-fixes).\n- USB: serial: option: add Fibocom FM135-GL variants (stable-fixes).\n- USB: serial: option: add Lonsung U8300/U9300 product (stable-fixes).\n- USB: serial: option: add MeiG Smart SLM320 product (stable-fixes).\n- USB: serial: option: add Rolling RW101-GL and RW135-GL support (stable-fixes).\n- USB: serial: option: add Telit FN920C04 rmnet compositions (stable-fixes).\n- USB: serial: option: add support for Fibocom FM650/FG650 (stable-fixes).\n- USB: serial: option: support Quectel EM060K sub-models (stable-fixes).\n- nfsd: Fixed mount kerberized nfs4 share issue (git-fixes bsc#1223858).\n- s390: Fixed kernel backtrack (bsc#1141539 git-fixes).\n- nfsd: Fixed mount issue with KOTD (bsc#1223380 bsc#1217408 bsc#1223640).\n- s390: Fixed LPM of lpar failure with error HSCLA2CF in 19th loops (jsc#PED-542 git-fixes bsc#1213573 ltc#203238).\n- ahci: asm1064: asm1166: do not limit reported ports (git-fixes).\n- ahci: asm1064: correct count of reported ports (stable-fixes).\n- arm64: dts: imx8-ss-conn: fix usdhc wrong lpcg clock order (git-fixes)\n- arm64: dts: rockchip: Remove unsupported node from the Pinebook Pro (git-fixes)\n- arm64: dts: rockchip: enable internal pull-up for Q7_THRM# on RK3399 (git-fixes)\n- arm64: dts: rockchip: enable internal pull-up on PCIE_WAKE# for (git-fixes)\n- arm64: dts: rockchip: enable internal pull-up on Q7_USB_ID for RK3399 (git-fixes)\n- arm64: dts: rockchip: fix rk3328 hdmi ports node (git-fixes)\n- arm64: dts: rockchip: fix rk3399 hdmi ports node (git-fixes)\n- arm64: hibernate: Fix level3 translation fault in swsusp_save() (git-fixes).\n- ax25: fix use-after-free bugs caused by ax25_ds_del_timer (git-fixes).\n- batman-adv: Avoid infinite loop trying to resize local TT (git-fixes).\n- clk: Get runtime PM before walking tree during disable_unused (git-fixes).\n- clk: Initialize struct clk_core kref earlier (stable-fixes).\n- clk: Mark \u0027all_lists\u0027 as const (stable-fixes).\n- clk: Print an info line before disabling unused clocks (stable-fixes).\n- clk: Remove prepare_lock hold assertion in __clk_release() (git-fixes).\n- clk: remove extra empty line (stable-fixes).\n- comedi: vmk80xx: fix incomplete endpoint checking (git-fixes).\n- dma: xilinx_dpdma: Fix locking (git-fixes).\n- dmaengine: idxd: Fix oops during rmmod on single-CPU platforms (git-fixes).\n- dmaengine: owl: fix register access functions (git-fixes).\n- dmaengine: tegra186: Fix residual calculation (git-fixes).\n- docs: Document the FAN_FS_ERROR event (stable-fixes).\n- drm-print: add drm_dbg_driver to improve namespace symmetry (stable-fixes).\n- drm/amd/display: Do not recursively call manual trigger programming (stable-fixes).\n- drm/amd/display: Fix nanosec stat overflow (stable-fixes).\n- drm/amd/display: fix disable otg wa logic in DCN316 (stable-fixes).\n- drm/amd/pm: fixes a random hang in S4 for SMU v13.0.4/11 (stable-fixes).\n- drm/amdgpu/sdma5.2: use legacy HDP flush for SDMA2/3 (stable-fixes).\n- drm/amdgpu: Fix leak when GPU memory allocation fails (stable-fixes).\n- drm/amdgpu: Reset dGPU if suspend got aborted (stable-fixes).\n- drm/amdgpu: always force full reset for SOC21 (stable-fixes).\n- drm/amdgpu: fix incorrect active rb bitmap for gfx11 (stable-fixes).\n- drm/amdgpu: fix incorrect number of active RBs for gfx11 (stable-fixes).\n- drm/amdgpu: once more fix the call oder in amdgpu_ttm_move() v2 (git-fixes).\n- drm/amdgpu: validate the parameters of bo mapping operations more clearly (git-fixes).\n- drm/amdkfd: Reset GPU on queue preemption failure (stable-fixes).\n- drm/ast: Fix soft lockup (git-fixes).\n- drm/client: Fully protect modes[] with dev-\u003emode_config.mutex (stable-fixes).\n- drm/i915/cdclk: Fix CDCLK programming order when pipes are active (git-fixes).\n- drm/i915/vrr: Disable VRR when using bigjoiner (stable-fixes).\n- drm/i915: Disable port sync when bigjoiner is used (stable-fixes).\n- drm/msm/dp: fix typo in dp_display_handle_port_status_changed() (git-fixes).\n- drm/nouveau/nvkm: add a replacement for nvkm_notify (bsc#1223834)\n- drm/panel: ili9341: Respect deferred probe (git-fixes).\n- drm/panel: ili9341: Use predefined error codes (git-fixes).\n- drm/panel: visionox-rm69299: do not unregister DSI device (git-fixes).\n- drm/vc4: do not check if plane-\u003estate-\u003efb == state-\u003efb (stable-fixes).\n- drm/vmwgfx: Enable DMA mappings with SEV (git-fixes).\n- drm/vmwgfx: Fix crtc\u0027s atomic check conditional (git-fixes).\n- drm/vmwgfx: Fix invalid reads in fence signaled events (git-fixes).\n- drm/vmwgfx: Sort primary plane formats by order of preference (git-fixes).\n- drm: nv04: Fix out of bounds access (git-fixes).\n- drm: panel-orientation-quirks: Add quirk for GPD Win Mini (stable-fixes).\n- drm: panel-orientation-quirks: Add quirk for Lenovo Legion Go (stable-fixes).\n- dump_stack: Do not get cpu_sync for panic CPU (bsc#1223574).\n- fbdev: fix incorrect address computation in deferred IO (git-fixes).\n- fbdev: viafb: fix typo in hw_bitblt_1 and hw_bitblt_2 (stable-fixes).\n- fbmon: prevent division by zero in fb_videomode_from_videomode() (stable-fixes).\n- fuse: do not unhash root (bsc#1223951).\n- fuse: fix root lookup with nonzero generation (bsc#1223950).\n- hwmon: (amc6821) add of_match table (stable-fixes).\n- i2c: pxa: hide unused icr_bits[] variable (git-fixes).\n- i2c: smbus: fix NULL function pointer dereference (git-fixes).\n- i40e: Fix VF MAC filter removal (git-fixes).\n- idma64: Do not try to serve interrupts when device is powered off (git-fixes).\n- iio: accel: mxc4005: Interrupt handling fixes (git-fixes).\n- iio:imu: adis16475: Fix sync mode setting (git-fixes).\n- init/main.c: Fix potential static_command_line memory overflow (git-fixes).\n- ipv6/addrconf: fix a potential refcount underflow for idev (git-fixes).\n- irqchip/gic-v3-its: Prevent double free on error (git-fixes).\n- kprobes: Fix possible use-after-free issue on kprobe registration (git-fixes).\n- livepatch: Fix missing newline character in klp_resolve_symbols() (bsc#1223539).\n- media: cec: core: remove length check of Timer Status (stable-fixes).\n- media: sta2x11: fix irq handler cast (stable-fixes).\n- mei: me: add arrow lake point H DID (stable-fixes).\n- mei: me: add arrow lake point S DID (stable-fixes).\n- mei: me: disable RPL-S on SPS and IGN firmwares (git-fixes).\n- mm/vmscan: make sure wakeup_kswapd with managed zone (bsc#1223473).\n- mmc: sdhci-msm: pervent access to suspended controller (git-fixes).\n- mtd: diskonchip: work around ubsan link failure (stable-fixes).\n- net: bridge: vlan: fix memory leak in __allowed_ingress (git-fixes).\n- net: fix a memleak when uncloning an skb dst and its metadata (git-fixes).\n- net: fix skb leak in __skb_tstamp_tx() (git-fixes).\n- net: ipv6: ensure we call ipv6_mc_down() at most once (git-fixes).\n- net: mld: fix reference count leak in mld_{query | report}_work() (git-fixes).\n- net: stream: purge sk_error_queue in sk_stream_kill_queues() (git-fixes).\n- net: usb: ax88179_178a: avoid writing the mac address before first reading (git-fixes).\n- net: usb: ax88179_178a: stop lying about skb-\u003etruesize (git-fixes).\n- net: vlan: fix underflow for the real_dev refcnt (git-fixes).\n- net: vmxnet3: Fix NULL pointer dereference in vmxnet3_rq_rx_complete() (bsc#1223360).\n- netfilter: br_netfilter: Drop dst references before setting (git-fixes).\n- netfilter: ipt_CLUSTERIP: fix refcount leak in clusterip_tg_check() (git-fixes).\n- netfilter: nft_ct: fix l3num expectations with inet pseudo family (git-fixes).\n- nfsd: use __fput_sync() to avoid delayed closing of files (bsc#1223380 bsc#1217408).\n- nilfs2: fix OOB in nilfs_set_de_type (git-fixes).\n- nilfs2: fix OOB in nilfs_set_de_type (git-fixes).\n- nouveau: fix function cast warning (git-fixes).\n- nouveau: fix instmem race condition around ptr stores (git-fixes).\n- phy: tegra: xusb: Add API to retrieve the port number of phy (stable-fixes).\n- pinctrl: renesas: checker: Limit cfg reg enum checks to provided IDs (stable-fixes).\n- platform/x86: intel-vbtn: Update tablet mode switch at end of probe (git-fixes).\n- platform/x86: touchscreen_dmi: Add an extra entry for a variant of the Chuwi Vi8 tablet (stable-fixes).\n- powerpc/kasan: Do not instrument non-maskable or raw interrupts (bsc#1223191).\n- powerpc/rtas: define pr_fmt and convert printk call sites (bsc#1223369 ltc#205888).\n- powerpc/rtas: export rtas_error_rc() for reuse (bsc#1223369 ltc#205888).\n- powerpc: Avoid nmi_enter/nmi_exit in real mode interrupt (bsc#1221645 ltc#205739 bsc#1223191).\n- powerpc: Refactor verification of MSR_RI (bsc#1223191).\n- printk: Add this_cpu_in_panic() (bsc#1223574).\n- printk: Adjust mapping for 32bit seq macros (bsc#1223574).\n- printk: Avoid non-panic CPUs writing to ringbuffer (bsc#1223574).\n- printk: Disable passing console lock owner completely during panic() (bsc#1223574).\n- printk: Drop console_sem during panic (bsc#1223574).\n- printk: Rename abandon_console_lock_in_panic() to other_cpu_in_panic() (bsc#1223574).\n- printk: Use prb_first_seq() as base for 32bit seq macros (bsc#1223574).\n- printk: Wait for all reserved records with pr_flush() (bsc#1223574).\n- printk: nbcon: Relocate 32bit seq macros (bsc#1223574).\n- printk: ringbuffer: Clarify special lpos values (bsc#1223574).\n- printk: ringbuffer: Cleanup reader terminology (bsc#1223574).\n- printk: ringbuffer: Do not skip non-finalized records with prb_next_seq() (bsc#1223574).\n- printk: ringbuffer: Improve prb_next_seq() performance (bsc#1223574).\n- printk: ringbuffer: Skip non-finalized records in panic (bsc#1223574).\n- pstore/zone: Add a null pointer check to the psz_kmsg_read (stable-fixes).\n- ring-buffer: Only update pages_touched when a new page is touched (git-fixes).\n- ring-buffer: use READ_ONCE() to read cpu_buffer-\u003ecommit_page in concurrent environment (git-fixes).\n- s390/cio: Ensure the copied buf is NUL terminated (git-fixes bsc#1223875).\n- s390/decompressor: fix misaligned symbol build error (git-fixes bsc#1223785).\n- s390/mm: Fix clearing storage keys for huge pages (git-fixes bsc#1223877).\n- s390/mm: Fix storage key clearing for guest huge pages (git-fixes bsc#1223878).\n- s390/qeth: Fix kernel panic after setting hsuid (git-fixes bsc#1223879).\n- s390/scm: fix virtual vs physical address confusion (git-fixes bsc#1223784).\n- s390/vdso: Add CFI for RA register to asm macro vdso_func (git-fixes bsc#1223876).\n- s390/vdso: drop \u0027-fPIC\u0027 from LDFLAGS (git-fixes bsc#1223598).\n- s390/zcrypt: fix reference counting on zcrypt card objects (git-fixes bsc#1223595).\n- serial/pmac_zilog: Remove flawed mitigation for rx irq flood (git-fixes).\n- serial: core: Provide port lock wrappers (stable-fixes).\n- serial: core: fix kernel-doc for uart_port_unlock_irqrestore() (git-fixes).\n- serial: mxs-auart: add spinlock around changing cts state (git-fixes).\n- slimbus: qcom-ngd-ctrl: Add timeout for wait operation (git-fixes).\n- speakup: Avoid crash on very long word (git-fixes).\n- speakup: Fix 8bit characters from direct synth (git-fixes).\n- spi: hisi-kunpeng: Delete the dump interface of data registers in debugfs (git-fixes).\n- tcp/udp: Fix memleaks of sk and zerocopy skbs with TX timestamp (git-fixes).\n- thunderbolt: Avoid notify PM core about runtime PM resume (stable-fixes).\n- thunderbolt: Fix wake configurations after device unplug (stable-fixes).\n- tracing/net_sched: Fix tracepoints that save qdisc_dev() as a string (git-fixes).\n- tracing: Show size of requested perf buffer (git-fixes).\n- usb: Disable USB3 LPM at shutdown (stable-fixes).\n- usb: Fix regression caused by invalid ep0 maxpacket in virtual SuperSpeed device (git-fixes).\n- usb: dwc2: host: Fix dereference issue in DDMA completion flow (git-fixes).\n- usb: dwc3: core: Prevent phy suspend during init (Git-fixes).\n- usb: gadget: composite: fix OS descriptors w_value logic (git-fixes).\n- usb: gadget: f_fs: Fix a race condition when processing setup packets (git-fixes).\n- usb: gadget: f_ncm: Fix UAF ncm object at re-bind after usb ep transport error (stable-fixes).\n- usb: gadget: tegra-xudc: Fix USB3 PHY retrieval logic (git-fixes).\n- usb: ohci: Prevent missed ohci interrupts (git-fixes).\n- usb: sl811-hcd: only defined function checkdone if QUIRK2 is defined (stable-fixes).\n- usb: typec: tcpci: add generic tcpci fallback compatible (stable-fixes).\n- usb: typec: tcpm: Check for port partner validity before consuming it (git-fixes).\n- usb: typec: tcpm: unregister existing source caps before re-registration (bsc#1220569).\n- usb: typec: ucsi: Ack unsupported commands (stable-fixes).\n- usb: typec: ucsi: Clear UCSI_CCI_RESET_COMPLETE before reset (stable-fixes).\n- usb: typec: ucsi: Fix connector check on init (git-fixes).\n- usb: udc: remove warning when queue disabled ep (stable-fixes).\n- virtio: treat alloc_dax() -EOPNOTSUPP failure as non-fatal (bsc#1223949).\n- wifi: ath9k: fix LNA selection in ath_ant_try_scan() (stable-fixes).\n- wifi: iwlwifi: mvm: remove old PASN station when adding a new one (git-fixes).\n- wifi: iwlwifi: mvm: return uid from iwl_mvm_build_scan_cmd (git-fixes).\n- wifi: mac80211: check/clear fast rx for non-4addr sta VLAN changes (stable-fixes).\n- wifi: nl80211: do not free NULL coalescing rule (git-fixes).\n- x86/bugs: Cache the value of MSR_IA32_ARCH_CAPABILITIES (git-fixes).\n- x86/bugs: Fix BHI documentation (git-fixes).\n- x86/bugs: Fix BHI handling of RRSBA (git-fixes).\n- x86/bugs: Fix BHI retpoline check (git-fixes).\n- x86/bugs: Fix return type of spectre_bhi_state() (git-fixes).\n- x86/bugs: Rename various \u0027ia32_cap\u0027 variables to \u0027x86_arch_cap_msr\u0027 (git-fixes).\n- x86/cpufeatures: Fix dependencies for GFNI, VAES, and VPCLMULQDQ (git-fixes).\n- x86/mm: Ensure input to pfn_to_kaddr() is treated as a 64-bit type (jsc#PED-7167 git-fixes).\n- x86/sev: Skip ROM range scans and validation for SEV-SNP guests (jsc#PED-7167 git-fixes).\n- xfrm6: fix inet6_dev refcount underflow problem (git-fixes).\n",
        "title": "Description of the patch"
      },
      {
        "category": "details",
        "text": "SUSE-2024-1644,SUSE-SLE-Module-Public-Cloud-15-SP5-2024-1644,openSUSE-SLE-15.5-2024-1644",
        "title": "Patchnames"
      },
      {
        "category": "legal_disclaimer",
        "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
        "title": "Terms of use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://www.suse.com/support/security/contact/",
      "name": "SUSE Product Security Team",
      "namespace": "https://www.suse.com/"
    },
    "references": [
      {
        "category": "external",
        "summary": "SUSE ratings",
        "url": "https://www.suse.com/support/security/rating/"
      },
      {
        "category": "self",
        "summary": "URL of this CSAF notice",
        "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2024_1644-1.json"
      },
      {
        "category": "self",
        "summary": "URL for SUSE-SU-2024:1644-1",
        "url": "https://www.suse.com/support/update/announcement/2024/suse-su-20241644-1/"
      },
      {
        "category": "self",
        "summary": "E-Mail link for SUSE-SU-2024:1644-1",
        "url": "https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1141539",
        "url": "https://bugzilla.suse.com/1141539"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1190576",
        "url": "https://bugzilla.suse.com/1190576"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1192145",
        "url": "https://bugzilla.suse.com/1192145"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1192837",
        "url": "https://bugzilla.suse.com/1192837"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1193629",
        "url": "https://bugzilla.suse.com/1193629"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1196869",
        "url": "https://bugzilla.suse.com/1196869"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1200313",
        "url": "https://bugzilla.suse.com/1200313"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1201308",
        "url": "https://bugzilla.suse.com/1201308"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1201489",
        "url": "https://bugzilla.suse.com/1201489"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1203906",
        "url": "https://bugzilla.suse.com/1203906"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1203935",
        "url": "https://bugzilla.suse.com/1203935"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1204614",
        "url": "https://bugzilla.suse.com/1204614"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1207361",
        "url": "https://bugzilla.suse.com/1207361"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1211592",
        "url": "https://bugzilla.suse.com/1211592"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1213573",
        "url": "https://bugzilla.suse.com/1213573"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1217339",
        "url": "https://bugzilla.suse.com/1217339"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1217408",
        "url": "https://bugzilla.suse.com/1217408"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1218562",
        "url": "https://bugzilla.suse.com/1218562"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1218917",
        "url": "https://bugzilla.suse.com/1218917"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1219104",
        "url": "https://bugzilla.suse.com/1219104"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1219126",
        "url": "https://bugzilla.suse.com/1219126"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1219141",
        "url": "https://bugzilla.suse.com/1219141"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1219169",
        "url": "https://bugzilla.suse.com/1219169"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1219170",
        "url": "https://bugzilla.suse.com/1219170"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1219264",
        "url": "https://bugzilla.suse.com/1219264"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1220342",
        "url": "https://bugzilla.suse.com/1220342"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1220569",
        "url": "https://bugzilla.suse.com/1220569"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1220761",
        "url": "https://bugzilla.suse.com/1220761"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1221042",
        "url": "https://bugzilla.suse.com/1221042"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1221044",
        "url": "https://bugzilla.suse.com/1221044"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1221080",
        "url": "https://bugzilla.suse.com/1221080"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1221084",
        "url": "https://bugzilla.suse.com/1221084"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1221088",
        "url": "https://bugzilla.suse.com/1221088"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1221299",
        "url": "https://bugzilla.suse.com/1221299"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1221612",
        "url": "https://bugzilla.suse.com/1221612"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1221617",
        "url": "https://bugzilla.suse.com/1221617"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1221645",
        "url": "https://bugzilla.suse.com/1221645"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1221825",
        "url": "https://bugzilla.suse.com/1221825"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222294",
        "url": "https://bugzilla.suse.com/1222294"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222307",
        "url": "https://bugzilla.suse.com/1222307"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222357",
        "url": "https://bugzilla.suse.com/1222357"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222368",
        "url": "https://bugzilla.suse.com/1222368"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222379",
        "url": "https://bugzilla.suse.com/1222379"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222385",
        "url": "https://bugzilla.suse.com/1222385"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222424",
        "url": "https://bugzilla.suse.com/1222424"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222430",
        "url": "https://bugzilla.suse.com/1222430"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222435",
        "url": "https://bugzilla.suse.com/1222435"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222482",
        "url": "https://bugzilla.suse.com/1222482"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222559",
        "url": "https://bugzilla.suse.com/1222559"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222585",
        "url": "https://bugzilla.suse.com/1222585"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222613",
        "url": "https://bugzilla.suse.com/1222613"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222615",
        "url": "https://bugzilla.suse.com/1222615"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222618",
        "url": "https://bugzilla.suse.com/1222618"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222624",
        "url": "https://bugzilla.suse.com/1222624"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222666",
        "url": "https://bugzilla.suse.com/1222666"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222669",
        "url": "https://bugzilla.suse.com/1222669"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222671",
        "url": "https://bugzilla.suse.com/1222671"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222703",
        "url": "https://bugzilla.suse.com/1222703"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222704",
        "url": "https://bugzilla.suse.com/1222704"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222709",
        "url": "https://bugzilla.suse.com/1222709"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222710",
        "url": "https://bugzilla.suse.com/1222710"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222721",
        "url": "https://bugzilla.suse.com/1222721"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222726",
        "url": "https://bugzilla.suse.com/1222726"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222773",
        "url": "https://bugzilla.suse.com/1222773"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222776",
        "url": "https://bugzilla.suse.com/1222776"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222785",
        "url": "https://bugzilla.suse.com/1222785"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222787",
        "url": "https://bugzilla.suse.com/1222787"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222790",
        "url": "https://bugzilla.suse.com/1222790"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222791",
        "url": "https://bugzilla.suse.com/1222791"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222792",
        "url": "https://bugzilla.suse.com/1222792"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222793",
        "url": "https://bugzilla.suse.com/1222793"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222796",
        "url": "https://bugzilla.suse.com/1222796"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222812",
        "url": "https://bugzilla.suse.com/1222812"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222824",
        "url": "https://bugzilla.suse.com/1222824"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222829",
        "url": "https://bugzilla.suse.com/1222829"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222832",
        "url": "https://bugzilla.suse.com/1222832"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222836",
        "url": "https://bugzilla.suse.com/1222836"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222838",
        "url": "https://bugzilla.suse.com/1222838"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222866",
        "url": "https://bugzilla.suse.com/1222866"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222867",
        "url": "https://bugzilla.suse.com/1222867"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222869",
        "url": "https://bugzilla.suse.com/1222869"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222870",
        "url": "https://bugzilla.suse.com/1222870"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222876",
        "url": "https://bugzilla.suse.com/1222876"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222878",
        "url": "https://bugzilla.suse.com/1222878"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222879",
        "url": "https://bugzilla.suse.com/1222879"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222881",
        "url": "https://bugzilla.suse.com/1222881"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222883",
        "url": "https://bugzilla.suse.com/1222883"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222888",
        "url": "https://bugzilla.suse.com/1222888"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222894",
        "url": "https://bugzilla.suse.com/1222894"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222901",
        "url": "https://bugzilla.suse.com/1222901"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222968",
        "url": "https://bugzilla.suse.com/1222968"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222976",
        "url": "https://bugzilla.suse.com/1222976"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223012",
        "url": "https://bugzilla.suse.com/1223012"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223014",
        "url": "https://bugzilla.suse.com/1223014"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223016",
        "url": "https://bugzilla.suse.com/1223016"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223024",
        "url": "https://bugzilla.suse.com/1223024"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223033",
        "url": "https://bugzilla.suse.com/1223033"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223034",
        "url": "https://bugzilla.suse.com/1223034"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223035",
        "url": "https://bugzilla.suse.com/1223035"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223036",
        "url": "https://bugzilla.suse.com/1223036"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223037",
        "url": "https://bugzilla.suse.com/1223037"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223041",
        "url": "https://bugzilla.suse.com/1223041"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223042",
        "url": "https://bugzilla.suse.com/1223042"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223051",
        "url": "https://bugzilla.suse.com/1223051"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223052",
        "url": "https://bugzilla.suse.com/1223052"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223056",
        "url": "https://bugzilla.suse.com/1223056"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223057",
        "url": "https://bugzilla.suse.com/1223057"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223058",
        "url": "https://bugzilla.suse.com/1223058"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223060",
        "url": "https://bugzilla.suse.com/1223060"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223061",
        "url": "https://bugzilla.suse.com/1223061"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223065",
        "url": "https://bugzilla.suse.com/1223065"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223066",
        "url": "https://bugzilla.suse.com/1223066"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223076",
        "url": "https://bugzilla.suse.com/1223076"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223078",
        "url": "https://bugzilla.suse.com/1223078"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223111",
        "url": "https://bugzilla.suse.com/1223111"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223115",
        "url": "https://bugzilla.suse.com/1223115"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223118",
        "url": "https://bugzilla.suse.com/1223118"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223119",
        "url": "https://bugzilla.suse.com/1223119"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223140",
        "url": "https://bugzilla.suse.com/1223140"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223187",
        "url": "https://bugzilla.suse.com/1223187"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223189",
        "url": "https://bugzilla.suse.com/1223189"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223190",
        "url": "https://bugzilla.suse.com/1223190"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223191",
        "url": "https://bugzilla.suse.com/1223191"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223196",
        "url": "https://bugzilla.suse.com/1223196"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223197",
        "url": "https://bugzilla.suse.com/1223197"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223198",
        "url": "https://bugzilla.suse.com/1223198"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223207",
        "url": "https://bugzilla.suse.com/1223207"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223275",
        "url": "https://bugzilla.suse.com/1223275"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223323",
        "url": "https://bugzilla.suse.com/1223323"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223360",
        "url": "https://bugzilla.suse.com/1223360"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223369",
        "url": "https://bugzilla.suse.com/1223369"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223380",
        "url": "https://bugzilla.suse.com/1223380"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223432",
        "url": "https://bugzilla.suse.com/1223432"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223473",
        "url": "https://bugzilla.suse.com/1223473"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223474",
        "url": "https://bugzilla.suse.com/1223474"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223475",
        "url": "https://bugzilla.suse.com/1223475"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223477",
        "url": "https://bugzilla.suse.com/1223477"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223478",
        "url": "https://bugzilla.suse.com/1223478"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223479",
        "url": "https://bugzilla.suse.com/1223479"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223481",
        "url": "https://bugzilla.suse.com/1223481"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223482",
        "url": "https://bugzilla.suse.com/1223482"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223484",
        "url": "https://bugzilla.suse.com/1223484"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223487",
        "url": "https://bugzilla.suse.com/1223487"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223490",
        "url": "https://bugzilla.suse.com/1223490"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223496",
        "url": "https://bugzilla.suse.com/1223496"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223498",
        "url": "https://bugzilla.suse.com/1223498"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223499",
        "url": "https://bugzilla.suse.com/1223499"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223501",
        "url": "https://bugzilla.suse.com/1223501"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223502",
        "url": "https://bugzilla.suse.com/1223502"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223503",
        "url": "https://bugzilla.suse.com/1223503"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223505",
        "url": "https://bugzilla.suse.com/1223505"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223509",
        "url": "https://bugzilla.suse.com/1223509"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223511",
        "url": "https://bugzilla.suse.com/1223511"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223512",
        "url": "https://bugzilla.suse.com/1223512"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223513",
        "url": "https://bugzilla.suse.com/1223513"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223516",
        "url": "https://bugzilla.suse.com/1223516"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223517",
        "url": "https://bugzilla.suse.com/1223517"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223518",
        "url": "https://bugzilla.suse.com/1223518"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223519",
        "url": "https://bugzilla.suse.com/1223519"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223520",
        "url": "https://bugzilla.suse.com/1223520"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223522",
        "url": "https://bugzilla.suse.com/1223522"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223523",
        "url": "https://bugzilla.suse.com/1223523"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223525",
        "url": "https://bugzilla.suse.com/1223525"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223536",
        "url": "https://bugzilla.suse.com/1223536"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223539",
        "url": "https://bugzilla.suse.com/1223539"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223574",
        "url": "https://bugzilla.suse.com/1223574"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223595",
        "url": "https://bugzilla.suse.com/1223595"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223598",
        "url": "https://bugzilla.suse.com/1223598"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223628",
        "url": "https://bugzilla.suse.com/1223628"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223634",
        "url": "https://bugzilla.suse.com/1223634"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223640",
        "url": "https://bugzilla.suse.com/1223640"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223643",
        "url": "https://bugzilla.suse.com/1223643"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223644",
        "url": "https://bugzilla.suse.com/1223644"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223645",
        "url": "https://bugzilla.suse.com/1223645"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223646",
        "url": "https://bugzilla.suse.com/1223646"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223648",
        "url": "https://bugzilla.suse.com/1223648"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223655",
        "url": "https://bugzilla.suse.com/1223655"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223657",
        "url": "https://bugzilla.suse.com/1223657"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223660",
        "url": "https://bugzilla.suse.com/1223660"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223661",
        "url": "https://bugzilla.suse.com/1223661"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223663",
        "url": "https://bugzilla.suse.com/1223663"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223664",
        "url": "https://bugzilla.suse.com/1223664"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223668",
        "url": "https://bugzilla.suse.com/1223668"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223670",
        "url": "https://bugzilla.suse.com/1223670"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223679",
        "url": "https://bugzilla.suse.com/1223679"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223686",
        "url": "https://bugzilla.suse.com/1223686"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223693",
        "url": "https://bugzilla.suse.com/1223693"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223705",
        "url": "https://bugzilla.suse.com/1223705"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223714",
        "url": "https://bugzilla.suse.com/1223714"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223735",
        "url": "https://bugzilla.suse.com/1223735"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223738",
        "url": "https://bugzilla.suse.com/1223738"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223745",
        "url": "https://bugzilla.suse.com/1223745"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223784",
        "url": "https://bugzilla.suse.com/1223784"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223785",
        "url": "https://bugzilla.suse.com/1223785"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223790",
        "url": "https://bugzilla.suse.com/1223790"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223816",
        "url": "https://bugzilla.suse.com/1223816"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223821",
        "url": "https://bugzilla.suse.com/1223821"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223822",
        "url": "https://bugzilla.suse.com/1223822"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223823",
        "url": "https://bugzilla.suse.com/1223823"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223824",
        "url": "https://bugzilla.suse.com/1223824"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223827",
        "url": "https://bugzilla.suse.com/1223827"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223834",
        "url": "https://bugzilla.suse.com/1223834"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223858",
        "url": "https://bugzilla.suse.com/1223858"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223875",
        "url": "https://bugzilla.suse.com/1223875"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223876",
        "url": "https://bugzilla.suse.com/1223876"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223877",
        "url": "https://bugzilla.suse.com/1223877"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223878",
        "url": "https://bugzilla.suse.com/1223878"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223879",
        "url": "https://bugzilla.suse.com/1223879"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223894",
        "url": "https://bugzilla.suse.com/1223894"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223921",
        "url": "https://bugzilla.suse.com/1223921"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223922",
        "url": "https://bugzilla.suse.com/1223922"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223923",
        "url": "https://bugzilla.suse.com/1223923"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223924",
        "url": "https://bugzilla.suse.com/1223924"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223929",
        "url": "https://bugzilla.suse.com/1223929"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223931",
        "url": "https://bugzilla.suse.com/1223931"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223932",
        "url": "https://bugzilla.suse.com/1223932"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223934",
        "url": "https://bugzilla.suse.com/1223934"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223941",
        "url": "https://bugzilla.suse.com/1223941"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223948",
        "url": "https://bugzilla.suse.com/1223948"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223949",
        "url": "https://bugzilla.suse.com/1223949"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223950",
        "url": "https://bugzilla.suse.com/1223950"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223951",
        "url": "https://bugzilla.suse.com/1223951"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223952",
        "url": "https://bugzilla.suse.com/1223952"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223953",
        "url": "https://bugzilla.suse.com/1223953"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223956",
        "url": "https://bugzilla.suse.com/1223956"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223957",
        "url": "https://bugzilla.suse.com/1223957"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223960",
        "url": "https://bugzilla.suse.com/1223960"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223962",
        "url": "https://bugzilla.suse.com/1223962"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223963",
        "url": "https://bugzilla.suse.com/1223963"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223964",
        "url": "https://bugzilla.suse.com/1223964"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223996",
        "url": "https://bugzilla.suse.com/1223996"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47047 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47047/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47184 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47184/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47185 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47185/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47187 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47187/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47188 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47188/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47191 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47191/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47192 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47192/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47193 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47193/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47194 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47194/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47195 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47195/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47196 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47196/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47197 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47197/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47198 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47198/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47199 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47199/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47200 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47200/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47201 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47201/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47202 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47202/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47203 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47203/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47204 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47204/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47205 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47205/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47206 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47206/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47207 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47207/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47209 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47209/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47210 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47210/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47211 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47211/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47212 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47212/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47214 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47214/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47215 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47215/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47216 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47216/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47217 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47217/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47218 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47218/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47219 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47219/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-48631 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-48631/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-48632 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-48632/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-48634 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-48634/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-48636 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-48636/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-48637 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-48637/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-48638 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-48638/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-48639 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-48639/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-48640 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-48640/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-48642 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-48642/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-48644 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-48644/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-48646 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-48646/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-48647 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-48647/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-48648 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-48648/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-48650 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-48650/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-48651 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-48651/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-48652 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-48652/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-48653 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-48653/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-48654 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-48654/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-48655 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-48655/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-48656 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-48656/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-48657 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-48657/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-48658 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-48658/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-48659 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-48659/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-48660 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-48660/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-48662 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-48662/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-48663 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-48663/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-48667 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-48667/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-48668 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-48668/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-48671 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-48671/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-48672 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-48672/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-48673 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-48673/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-48675 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-48675/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-48686 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-48686/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-48687 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-48687/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-48688 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-48688/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-48690 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-48690/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-48692 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-48692/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-48693 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-48693/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-48694 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-48694/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-48695 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-48695/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-48697 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-48697/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-48698 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-48698/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-48699 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-48699/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-48700 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-48700/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-48701 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-48701/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-48702 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-48702/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-48703 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-48703/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-48704 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-48704/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-2860 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-2860/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-52585 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-52585/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-52589 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-52589/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-52590 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-52590/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-52591 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-52591/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-52593 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-52593/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-52614 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-52614/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-52616 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-52616/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-52620 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-52620/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-52635 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-52635/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-52645 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-52645/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-52646 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-52646/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-52652 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-52652/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-6270 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-6270/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-0639 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-0639/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-0841 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-0841/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-2201 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-2201/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-22099 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-22099/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-23307 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-23307/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-23848 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-23848/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-23850 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-23850/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26601 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26601/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26610 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26610/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26656 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26656/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26671 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26671/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26673 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26673/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26675 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26675/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26679 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26679/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26687 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26687/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26688 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26688/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26700 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26700/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26702 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26702/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26733 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26733/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26739 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26739/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26764 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26764/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26766 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26766/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26772 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26772/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26773 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26773/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26783 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26783/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26791 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26791/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26792 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26792/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26816 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26816/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26817 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26817/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26820 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26820/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26825 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26825/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26830 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26830/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26833 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26833/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26836 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26836/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26840 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26840/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26843 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26843/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26852 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26852/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26853 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26853/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26855 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26855/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26856 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26856/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26857 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26857/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26861 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26861/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26862 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26862/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26866 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26866/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26872 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26872/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26875 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26875/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26876 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26876/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26877 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26877/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26878 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26878/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26879 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26879/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26881 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26881/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26882 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26882/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26883 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26883/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26884 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26884/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26885 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26885/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26891 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26891/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26893 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26893/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26895 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26895/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26896 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26896/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26897 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26897/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26898 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26898/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26901 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26901/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26903 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26903/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26915 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26915/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26917 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26917/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26927 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26927/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26933 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26933/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26939 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26939/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26948 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26948/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26950 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26950/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26951 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26951/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26955 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26955/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26956 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26956/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26960 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26960/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26965 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26965/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26966 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26966/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26969 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26969/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26970 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26970/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26972 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26972/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26979 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26979/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26981 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26981/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26982 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26982/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26993 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26993/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-27013 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-27013/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-27014 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-27014/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-27030 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-27030/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-27038 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-27038/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-27039 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-27039/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-27041 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-27041/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-27042 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-27042/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-27043 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-27043/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-27046 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-27046/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-27056 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-27056/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-27059 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-27059/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-27062 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-27062/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-27389 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-27389/"
      }
    ],
    "title": "Security update for the Linux Kernel",
    "tracking": {
      "current_release_date": "2024-05-14T14:29:53Z",
      "generator": {
        "date": "2024-05-14T14:29:53Z",
        "engine": {
          "name": "cve-database.git:bin/generate-csaf.pl",
          "version": "1"
        }
      },
      "id": "SUSE-SU-2024:1644-1",
      "initial_release_date": "2024-05-14T14:29:53Z",
      "revision_history": [
        {
          "date": "2024-05-14T14:29:53Z",
          "number": "1",
          "summary": "Current version"
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
                "product": {
                  "name": "cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
                  "product_id": "cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
                "product": {
                  "name": "dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
                  "product_id": "dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
                "product": {
                  "name": "gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
                  "product_id": "gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-azure-5.14.21-150500.33.51.1.aarch64",
                "product": {
                  "name": "kernel-azure-5.14.21-150500.33.51.1.aarch64",
                  "product_id": "kernel-azure-5.14.21-150500.33.51.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
                "product": {
                  "name": "kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
                  "product_id": "kernel-azure-devel-5.14.21-150500.33.51.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
                "product": {
                  "name": "kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
                  "product_id": "kernel-azure-extra-5.14.21-150500.33.51.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
                "product": {
                  "name": "kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
                  "product_id": "kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
                "product": {
                  "name": "kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
                  "product_id": "kernel-azure-optional-5.14.21-150500.33.51.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
                "product": {
                  "name": "kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
                  "product_id": "kernel-syms-azure-5.14.21-150500.33.51.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
                "product": {
                  "name": "kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
                  "product_id": "kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
                "product": {
                  "name": "ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
                  "product_id": "ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
                "product": {
                  "name": "reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
                  "product_id": "reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64"
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
                "product": {
                  "name": "kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
                  "product_id": "kernel-devel-azure-5.14.21-150500.33.51.1.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-source-azure-5.14.21-150500.33.51.1.noarch",
                "product": {
                  "name": "kernel-source-azure-5.14.21-150500.33.51.1.noarch",
                  "product_id": "kernel-source-azure-5.14.21-150500.33.51.1.noarch"
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
                "product": {
                  "name": "cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
                  "product_id": "cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
                "product": {
                  "name": "dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
                  "product_id": "dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
                "product": {
                  "name": "gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
                  "product_id": "gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-azure-5.14.21-150500.33.51.1.x86_64",
                "product": {
                  "name": "kernel-azure-5.14.21-150500.33.51.1.x86_64",
                  "product_id": "kernel-azure-5.14.21-150500.33.51.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
                "product": {
                  "name": "kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
                  "product_id": "kernel-azure-devel-5.14.21-150500.33.51.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
                "product": {
                  "name": "kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
                  "product_id": "kernel-azure-extra-5.14.21-150500.33.51.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
                "product": {
                  "name": "kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
                  "product_id": "kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
                "product": {
                  "name": "kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
                  "product_id": "kernel-azure-optional-5.14.21-150500.33.51.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
                "product": {
                  "name": "kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
                  "product_id": "kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
                "product": {
                  "name": "kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
                  "product_id": "kernel-syms-azure-5.14.21-150500.33.51.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
                "product": {
                  "name": "kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
                  "product_id": "kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
                "product": {
                  "name": "ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
                  "product_id": "ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64",
                "product": {
                  "name": "reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64",
                  "product_id": "reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Module for Public Cloud 15 SP5",
                "product": {
                  "name": "SUSE Linux Enterprise Module for Public Cloud 15 SP5",
                  "product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP5",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-module-public-cloud:15:sp5"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "openSUSE Leap 15.5",
                "product": {
                  "name": "openSUSE Leap 15.5",
                  "product_id": "openSUSE Leap 15.5",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:opensuse:leap:15.5"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "SUSE Linux Enterprise"
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-azure-5.14.21-150500.33.51.1.aarch64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP5",
          "product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64"
        },
        "product_reference": "kernel-azure-5.14.21-150500.33.51.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-azure-5.14.21-150500.33.51.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP5",
          "product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64"
        },
        "product_reference": "kernel-azure-5.14.21-150500.33.51.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-azure-devel-5.14.21-150500.33.51.1.aarch64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP5",
          "product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64"
        },
        "product_reference": "kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-azure-devel-5.14.21-150500.33.51.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP5",
          "product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64"
        },
        "product_reference": "kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-azure-5.14.21-150500.33.51.1.noarch as component of SUSE Linux Enterprise Module for Public Cloud 15 SP5",
          "product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch"
        },
        "product_reference": "kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-azure-5.14.21-150500.33.51.1.noarch as component of SUSE Linux Enterprise Module for Public Cloud 15 SP5",
          "product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch"
        },
        "product_reference": "kernel-source-azure-5.14.21-150500.33.51.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-azure-5.14.21-150500.33.51.1.aarch64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP5",
          "product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64"
        },
        "product_reference": "kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-azure-5.14.21-150500.33.51.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP5",
          "product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64"
        },
        "product_reference": "kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64"
        },
        "product_reference": "cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64"
        },
        "product_reference": "cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64"
        },
        "product_reference": "dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64"
        },
        "product_reference": "dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64"
        },
        "product_reference": "gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64"
        },
        "product_reference": "gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-azure-5.14.21-150500.33.51.1.aarch64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64"
        },
        "product_reference": "kernel-azure-5.14.21-150500.33.51.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-azure-5.14.21-150500.33.51.1.x86_64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64"
        },
        "product_reference": "kernel-azure-5.14.21-150500.33.51.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-azure-devel-5.14.21-150500.33.51.1.aarch64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64"
        },
        "product_reference": "kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-azure-devel-5.14.21-150500.33.51.1.x86_64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64"
        },
        "product_reference": "kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-azure-extra-5.14.21-150500.33.51.1.aarch64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64"
        },
        "product_reference": "kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-azure-extra-5.14.21-150500.33.51.1.x86_64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64"
        },
        "product_reference": "kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64"
        },
        "product_reference": "kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64"
        },
        "product_reference": "kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-azure-optional-5.14.21-150500.33.51.1.aarch64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64"
        },
        "product_reference": "kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-azure-optional-5.14.21-150500.33.51.1.x86_64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64"
        },
        "product_reference": "kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64"
        },
        "product_reference": "kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-azure-5.14.21-150500.33.51.1.noarch as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch"
        },
        "product_reference": "kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-azure-5.14.21-150500.33.51.1.noarch as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch"
        },
        "product_reference": "kernel-source-azure-5.14.21-150500.33.51.1.noarch",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-azure-5.14.21-150500.33.51.1.aarch64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64"
        },
        "product_reference": "kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-azure-5.14.21-150500.33.51.1.x86_64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64"
        },
        "product_reference": "kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64"
        },
        "product_reference": "kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64"
        },
        "product_reference": "kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64"
        },
        "product_reference": "ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64"
        },
        "product_reference": "ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64"
        },
        "product_reference": "reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
        },
        "product_reference": "reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2021-47047",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47047"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nspi: spi-zynqmp-gqspi: return -ENOMEM if dma_map_single fails\n\nThe spi controller supports 44-bit address space on AXI in DMA mode,\nso set dma_addr_t width to 44-bit to avoid using a swiotlb mapping.\nIn addition, if dma_map_single fails, it should return immediately\ninstead of continuing doing the DMA operation which bases on invalid\naddress.\n\nThis fixes the following crash which occurs in reading a big block\nfrom flash:\n\n[  123.633577] zynqmp-qspi ff0f0000.spi: swiotlb buffer is full (sz: 4194304 bytes), total 32768 (slots), used 0 (slots)\n[  123.644230] zynqmp-qspi ff0f0000.spi: ERR:rxdma:memory not mapped\n[  123.784625] Unable to handle kernel paging request at virtual address 00000000003fffc0\n[  123.792536] Mem abort info:\n[  123.795313]   ESR = 0x96000145\n[  123.798351]   EC = 0x25: DABT (current EL), IL = 32 bits\n[  123.803655]   SET = 0, FnV = 0\n[  123.806693]   EA = 0, S1PTW = 0\n[  123.809818] Data abort info:\n[  123.812683]   ISV = 0, ISS = 0x00000145\n[  123.816503]   CM = 1, WnR = 1\n[  123.819455] user pgtable: 4k pages, 48-bit VAs, pgdp=0000000805047000\n[  123.825887] [00000000003fffc0] pgd=0000000803b45003, p4d=0000000803b45003, pud=0000000000000000\n[  123.834586] Internal error: Oops: 96000145 [#1] PREEMPT SMP",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47047",
          "url": "https://www.suse.com/security/cve/CVE-2021-47047"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1220761 for CVE-2021-47047",
          "url": "https://bugzilla.suse.com/1220761"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.6,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:29:53Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47047"
    },
    {
      "cve": "CVE-2021-47184",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47184"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ni40e: Fix NULL ptr dereference on VSI filter sync\n\nRemove the reason of null pointer dereference in sync VSI filters.\nAdded new I40E_VSI_RELEASING flag to signalize deleting and releasing\nof VSI resources to sync this thread with sync filters subtask.\nWithout this patch it is possible to start update the VSI filter list\nafter VSI is removed, that\u0027s causing a kernel oops.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47184",
          "url": "https://www.suse.com/security/cve/CVE-2021-47184"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222666 for CVE-2021-47184",
          "url": "https://bugzilla.suse.com/1222666"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:29:53Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47184"
    },
    {
      "cve": "CVE-2021-47185",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47185"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntty: tty_buffer: Fix the softlockup issue in flush_to_ldisc\n\nWhen running ltp testcase(ltp/testcases/kernel/pty/pty04.c) with arm64, there is a soft lockup,\nwhich look like this one:\n\n  Workqueue: events_unbound flush_to_ldisc\n  Call trace:\n   dump_backtrace+0x0/0x1ec\n   show_stack+0x24/0x30\n   dump_stack+0xd0/0x128\n   panic+0x15c/0x374\n   watchdog_timer_fn+0x2b8/0x304\n   __run_hrtimer+0x88/0x2c0\n   __hrtimer_run_queues+0xa4/0x120\n   hrtimer_interrupt+0xfc/0x270\n   arch_timer_handler_phys+0x40/0x50\n   handle_percpu_devid_irq+0x94/0x220\n   __handle_domain_irq+0x88/0xf0\n   gic_handle_irq+0x84/0xfc\n   el1_irq+0xc8/0x180\n   slip_unesc+0x80/0x214 [slip]\n   tty_ldisc_receive_buf+0x64/0x80\n   tty_port_default_receive_buf+0x50/0x90\n   flush_to_ldisc+0xbc/0x110\n   process_one_work+0x1d4/0x4b0\n   worker_thread+0x180/0x430\n   kthread+0x11c/0x120\n\nIn the testcase pty04, The first process call the write syscall to send\ndata to the pty master. At the same time, the workqueue will do the\nflush_to_ldisc to pop data in a loop until there is no more data left.\nWhen the sender and workqueue running in different core, the sender sends\ndata fastly in full time which will result in workqueue doing work in loop\nfor a long time and occuring softlockup in flush_to_ldisc with kernel\nconfigured without preempt. So I add need_resched check and cond_resched\nin the flush_to_ldisc loop to avoid it.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47185",
          "url": "https://www.suse.com/security/cve/CVE-2021-47185"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222669 for CVE-2021-47185",
          "url": "https://bugzilla.suse.com/1222669"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:29:53Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47185"
    },
    {
      "cve": "CVE-2021-47187",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47187"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\narm64: dts: qcom: msm8998: Fix CPU/L2 idle state latency and residency\n\nThe entry/exit latency and minimum residency in state for the idle\nstates of MSM8998 were ..bad: first of all, for all of them the\ntimings were written for CPU sleep but the min-residency-us param\nwas miscalculated (supposedly, while porting this from downstream);\nThen, the power collapse states are setting PC on both the CPU\ncluster *and* the L2 cache, which have different timings: in the\nspecific case of L2 the times are higher so these ones should be\ntaken into account instead of the CPU ones.\n\nThis parameter misconfiguration was not giving particular issues\nbecause on MSM8998 there was no CPU scaling at all, so cluster/L2\npower collapse was rarely (if ever) hit.\nWhen CPU scaling is enabled, though, the wrong timings will produce\nSoC unstability shown to the user as random, apparently error-less,\nsudden reboots and/or lockups.\n\nThis set of parameters are stabilizing the SoC when CPU scaling is\nON and when power collapse is frequently hit.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47187",
          "url": "https://www.suse.com/security/cve/CVE-2021-47187"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222703 for CVE-2021-47187",
          "url": "https://bugzilla.suse.com/1222703"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:29:53Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47187"
    },
    {
      "cve": "CVE-2021-47188",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47188"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: ufs: core: Improve SCSI abort handling\n\nThe following has been observed on a test setup:\n\nWARNING: CPU: 4 PID: 250 at drivers/scsi/ufs/ufshcd.c:2737 ufshcd_queuecommand+0x468/0x65c\nCall trace:\n ufshcd_queuecommand+0x468/0x65c\n scsi_send_eh_cmnd+0x224/0x6a0\n scsi_eh_test_devices+0x248/0x418\n scsi_eh_ready_devs+0xc34/0xe58\n scsi_error_handler+0x204/0x80c\n kthread+0x150/0x1b4\n ret_from_fork+0x10/0x30\n\nThat warning is triggered by the following statement:\n\n\tWARN_ON(lrbp-\u003ecmd);\n\nFix this warning by clearing lrbp-\u003ecmd from the abort handler.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47188",
          "url": "https://www.suse.com/security/cve/CVE-2021-47188"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222671 for CVE-2021-47188",
          "url": "https://bugzilla.suse.com/1222671"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:29:53Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47188"
    },
    {
      "cve": "CVE-2021-47191",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47191"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: scsi_debug: Fix out-of-bound read in resp_readcap16()\n\nThe following warning was observed running syzkaller:\n\n[ 3813.830724] sg_write: data in/out 65466/242 bytes for SCSI command 0x9e-- guessing data in;\n[ 3813.830724]    program syz-executor not setting count and/or reply_len properly\n[ 3813.836956] ==================================================================\n[ 3813.839465] BUG: KASAN: stack-out-of-bounds in sg_copy_buffer+0x157/0x1e0\n[ 3813.841773] Read of size 4096 at addr ffff8883cf80f540 by task syz-executor/1549\n[ 3813.846612] Call Trace:\n[ 3813.846995]  dump_stack+0x108/0x15f\n[ 3813.847524]  print_address_description+0xa5/0x372\n[ 3813.848243]  kasan_report.cold+0x236/0x2a8\n[ 3813.849439]  check_memory_region+0x240/0x270\n[ 3813.850094]  memcpy+0x30/0x80\n[ 3813.850553]  sg_copy_buffer+0x157/0x1e0\n[ 3813.853032]  sg_copy_from_buffer+0x13/0x20\n[ 3813.853660]  fill_from_dev_buffer+0x135/0x370\n[ 3813.854329]  resp_readcap16+0x1ac/0x280\n[ 3813.856917]  schedule_resp+0x41f/0x1630\n[ 3813.858203]  scsi_debug_queuecommand+0xb32/0x17e0\n[ 3813.862699]  scsi_dispatch_cmd+0x330/0x950\n[ 3813.863329]  scsi_request_fn+0xd8e/0x1710\n[ 3813.863946]  __blk_run_queue+0x10b/0x230\n[ 3813.864544]  blk_execute_rq_nowait+0x1d8/0x400\n[ 3813.865220]  sg_common_write.isra.0+0xe61/0x2420\n[ 3813.871637]  sg_write+0x6c8/0xef0\n[ 3813.878853]  __vfs_write+0xe4/0x800\n[ 3813.883487]  vfs_write+0x17b/0x530\n[ 3813.884008]  ksys_write+0x103/0x270\n[ 3813.886268]  __x64_sys_write+0x77/0xc0\n[ 3813.886841]  do_syscall_64+0x106/0x360\n[ 3813.887415]  entry_SYSCALL_64_after_hwframe+0x44/0xa9\n\nThis issue can be reproduced with the following syzkaller log:\n\nr0 = openat(0xffffffffffffff9c, \u0026(0x7f0000000040)=\u0027./file0\\x00\u0027, 0x26e1, 0x0)\nr1 = syz_open_procfs(0xffffffffffffffff, \u0026(0x7f0000000000)=\u0027fd/3\\x00\u0027)\nopen_by_handle_at(r1, \u0026(0x7f00000003c0)=ANY=[@ANYRESHEX], 0x602000)\nr2 = syz_open_dev$sg(\u0026(0x7f0000000000), 0x0, 0x40782)\nwrite$binfmt_aout(r2, \u0026(0x7f0000000340)=ANY=[@ANYBLOB=\"00000000deff000000000000000000000000000000000000000000000000000047f007af9e107a41ec395f1bded7be24277a1501ff6196a83366f4e6362bc0ff2b247f68a972989b094b2da4fb3607fcf611a22dd04310d28c75039d\"], 0x126)\n\nIn resp_readcap16() we get \"int alloc_len\" value -1104926854, and then pass\nthe huge arr_len to fill_from_dev_buffer(), but arr is only 32 bytes. This\nleads to OOB in sg_copy_buffer().\n\nTo solve this issue, define alloc_len as u32.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47191",
          "url": "https://www.suse.com/security/cve/CVE-2021-47191"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222866 for CVE-2021-47191",
          "url": "https://bugzilla.suse.com/1222866"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:29:53Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47191"
    },
    {
      "cve": "CVE-2021-47192",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47192"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: core: sysfs: Fix hang when device state is set via sysfs\n\nThis fixes a regression added with:\n\ncommit f0f82e2476f6 (\"scsi: core: Fix capacity set to zero after\nofflinining device\")\n\nThe problem is that after iSCSI recovery, iscsid will call into the kernel\nto set the dev\u0027s state to running, and with that patch we now call\nscsi_rescan_device() with the state_mutex held. If the SCSI error handler\nthread is just starting to test the device in scsi_send_eh_cmnd() then it\u0027s\ngoing to try to grab the state_mutex.\n\nWe are then stuck, because when scsi_rescan_device() tries to send its I/O\nscsi_queue_rq() calls -\u003e scsi_host_queue_ready() -\u003e scsi_host_in_recovery()\nwhich will return true (the host state is still in recovery) and I/O will\njust be requeued. scsi_send_eh_cmnd() will then never be able to grab the\nstate_mutex to finish error handling.\n\nTo prevent the deadlock move the rescan-related code to after we drop the\nstate_mutex.\n\nThis also adds a check for if we are already in the running state. This\nprevents extra scans and helps the iscsid case where if the transport class\nhas already onlined the device during its recovery process then we don\u0027t\nneed userspace to do it again plus possibly block that daemon.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47192",
          "url": "https://www.suse.com/security/cve/CVE-2021-47192"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222867 for CVE-2021-47192",
          "url": "https://bugzilla.suse.com/1222867"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:29:53Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47192"
    },
    {
      "cve": "CVE-2021-47193",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47193"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: pm80xx: Fix memory leak during rmmod\n\nDriver failed to release all memory allocated. This would lead to memory\nleak during driver removal.\n\nProperly free memory when the module is removed.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47193",
          "url": "https://www.suse.com/security/cve/CVE-2021-47193"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222879 for CVE-2021-47193",
          "url": "https://bugzilla.suse.com/1222879"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:29:53Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47193"
    },
    {
      "cve": "CVE-2021-47194",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47194"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncfg80211: call cfg80211_stop_ap when switch from P2P_GO type\n\nIf the userspace tools switch from NL80211_IFTYPE_P2P_GO to\nNL80211_IFTYPE_ADHOC via send_msg(NL80211_CMD_SET_INTERFACE), it\ndoes not call the cleanup cfg80211_stop_ap(), this leads to the\ninitialization of in-use data. For example, this path re-init the\nsdata-\u003eassigned_chanctx_list while it is still an element of\nassigned_vifs list, and makes that linked list corrupt.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47194",
          "url": "https://www.suse.com/security/cve/CVE-2021-47194"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222829 for CVE-2021-47194",
          "url": "https://bugzilla.suse.com/1222829"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:29:53Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47194"
    },
    {
      "cve": "CVE-2021-47195",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47195"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nspi: fix use-after-free of the add_lock mutex\n\nCommit 6098475d4cb4 (\"spi: Fix deadlock when adding SPI controllers on\nSPI buses\") introduced a per-controller mutex. But mutex_unlock() of\nsaid lock is called after the controller is already freed:\n\n  spi_unregister_controller(ctlr)\n  -\u003e put_device(\u0026ctlr-\u003edev)\n    -\u003e spi_controller_release(dev)\n  -\u003e mutex_unlock(\u0026ctrl-\u003eadd_lock)\n\nMove the put_device() after the mutex_unlock().",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47195",
          "url": "https://www.suse.com/security/cve/CVE-2021-47195"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222832 for CVE-2021-47195",
          "url": "https://bugzilla.suse.com/1222832"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:29:53Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47195"
    },
    {
      "cve": "CVE-2021-47196",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47196"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/core: Set send and receive CQ before forwarding to the driver\n\nPreset both receive and send CQ pointers prior to call to the drivers and\noverwrite it later again till the mlx4 is going to be changed do not\noverwrite ibqp properties.\n\nThis change is needed for mlx5, because in case of QP creation failure, it\nwill go to the path of QP destroy which relies on proper CQ pointers.\n\n BUG: KASAN: use-after-free in create_qp.cold+0x164/0x16e [mlx5_ib]\n Write of size 8 at addr ffff8880064c55c0 by task a.out/246\n\n CPU: 0 PID: 246 Comm: a.out Not tainted 5.15.0+ #291\n Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014\n Call Trace:\n  dump_stack_lvl+0x45/0x59\n  print_address_description.constprop.0+0x1f/0x140\n  kasan_report.cold+0x83/0xdf\n  create_qp.cold+0x164/0x16e [mlx5_ib]\n  mlx5_ib_create_qp+0x358/0x28a0 [mlx5_ib]\n  create_qp.part.0+0x45b/0x6a0 [ib_core]\n  ib_create_qp_user+0x97/0x150 [ib_core]\n  ib_uverbs_handler_UVERBS_METHOD_QP_CREATE+0x92c/0x1250 [ib_uverbs]\n  ib_uverbs_cmd_verbs+0x1c38/0x3150 [ib_uverbs]\n  ib_uverbs_ioctl+0x169/0x260 [ib_uverbs]\n  __x64_sys_ioctl+0x866/0x14d0\n  do_syscall_64+0x3d/0x90\n  entry_SYSCALL_64_after_hwframe+0x44/0xae\n\n Allocated by task 246:\n  kasan_save_stack+0x1b/0x40\n  __kasan_kmalloc+0xa4/0xd0\n  create_qp.part.0+0x92/0x6a0 [ib_core]\n  ib_create_qp_user+0x97/0x150 [ib_core]\n  ib_uverbs_handler_UVERBS_METHOD_QP_CREATE+0x92c/0x1250 [ib_uverbs]\n  ib_uverbs_cmd_verbs+0x1c38/0x3150 [ib_uverbs]\n  ib_uverbs_ioctl+0x169/0x260 [ib_uverbs]\n  __x64_sys_ioctl+0x866/0x14d0\n  do_syscall_64+0x3d/0x90\n  entry_SYSCALL_64_after_hwframe+0x44/0xae\n\n Freed by task 246:\n  kasan_save_stack+0x1b/0x40\n  kasan_set_track+0x1c/0x30\n  kasan_set_free_info+0x20/0x30\n  __kasan_slab_free+0x10c/0x150\n  slab_free_freelist_hook+0xb4/0x1b0\n  kfree+0xe7/0x2a0\n  create_qp.part.0+0x52b/0x6a0 [ib_core]\n  ib_create_qp_user+0x97/0x150 [ib_core]\n  ib_uverbs_handler_UVERBS_METHOD_QP_CREATE+0x92c/0x1250 [ib_uverbs]\n  ib_uverbs_cmd_verbs+0x1c38/0x3150 [ib_uverbs]\n  ib_uverbs_ioctl+0x169/0x260 [ib_uverbs]\n  __x64_sys_ioctl+0x866/0x14d0\n  do_syscall_64+0x3d/0x90\n  entry_SYSCALL_64_after_hwframe+0x44/0xae",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47196",
          "url": "https://www.suse.com/security/cve/CVE-2021-47196"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222773 for CVE-2021-47196",
          "url": "https://bugzilla.suse.com/1222773"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:29:53Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47196"
    },
    {
      "cve": "CVE-2021-47197",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47197"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/mlx5e: nullify cq-\u003edbg pointer in mlx5_debug_cq_remove()\n\nPrior to this patch in case mlx5_core_destroy_cq() failed it proceeds\nto rest of destroy operations. mlx5_core_destroy_cq() could be called again\nby user and cause additional call of mlx5_debug_cq_remove().\ncq-\u003edbg was not nullify in previous call and cause the crash.\n\nFix it by nullify cq-\u003edbg pointer after removal.\n\nAlso proceed to destroy operations only if FW return 0\nfor MLX5_CMD_OP_DESTROY_CQ command.\n\ngeneral protection fault, probably for non-canonical address 0x2000300004058: 0000 [#1] SMP PTI\nCPU: 5 PID: 1228 Comm: python Not tainted 5.15.0-rc5_for_upstream_min_debug_2021_10_14_11_06 #1\nHardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014\nRIP: 0010:lockref_get+0x1/0x60\nCode: 5d e9 53 ff ff ff 48 8d 7f 70 e8 0a 2e 48 00 c7 85 d0 00 00 00 02\n00 00 00 c6 45 70 00 fb 5d c3 c3 cc cc cc cc cc cc cc cc 53 \u003c48\u003e 8b 17\n48 89 fb 85 d2 75 3d 48 89 d0 bf 64 00 00 00 48 89 c1 48\nRSP: 0018:ffff888137dd7a38 EFLAGS: 00010206\nRAX: 0000000000000000 RBX: ffff888107d5f458 RCX: 00000000fffffffe\nRDX: 000000000002c2b0 RSI: ffffffff8155e2e0 RDI: 0002000300004058\nRBP: ffff888137dd7a88 R08: 0002000300004058 R09: ffff8881144a9f88\nR10: 0000000000000000 R11: 0000000000000000 R12: ffff8881141d4000\nR13: ffff888137dd7c68 R14: ffff888137dd7d58 R15: ffff888137dd7cc0\nFS:  00007f4644f2a4c0(0000) GS:ffff8887a2d40000(0000)\nknlGS:0000000000000000\nCS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 000055b4500f4380 CR3: 0000000114f7a003 CR4: 0000000000170ea0\nCall Trace:\n  simple_recursive_removal+0x33/0x2e0\n  ? debugfs_remove+0x60/0x60\n  debugfs_remove+0x40/0x60\n  mlx5_debug_cq_remove+0x32/0x70 [mlx5_core]\n  mlx5_core_destroy_cq+0x41/0x1d0 [mlx5_core]\n  devx_obj_cleanup+0x151/0x330 [mlx5_ib]\n  ? __pollwait+0xd0/0xd0\n  ? xas_load+0x5/0x70\n  ? xa_load+0x62/0xa0\n  destroy_hw_idr_uobject+0x20/0x80 [ib_uverbs]\n  uverbs_destroy_uobject+0x3b/0x360 [ib_uverbs]\n  uobj_destroy+0x54/0xa0 [ib_uverbs]\n  ib_uverbs_cmd_verbs+0xaf2/0x1160 [ib_uverbs]\n  ? uverbs_finalize_object+0xd0/0xd0 [ib_uverbs]\n  ib_uverbs_ioctl+0xc4/0x1b0 [ib_uverbs]\n  __x64_sys_ioctl+0x3e4/0x8e0",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47197",
          "url": "https://www.suse.com/security/cve/CVE-2021-47197"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222776 for CVE-2021-47197",
          "url": "https://bugzilla.suse.com/1222776"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:29:53Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47197"
    },
    {
      "cve": "CVE-2021-47198",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47198"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: lpfc: Fix use-after-free in lpfc_unreg_rpi() routine\n\nAn error is detected with the following report when unloading the driver:\n  \"KASAN: use-after-free in lpfc_unreg_rpi+0x1b1b\"\n\nThe NLP_REG_LOGIN_SEND nlp_flag is set in lpfc_reg_fab_ctrl_node(), but the\nflag is not cleared upon completion of the login.\n\nThis allows a second call to lpfc_unreg_rpi() to proceed with nlp_rpi set\nto LPFC_RPI_ALLOW_ERROR.  This results in a use after free access when used\nas an rpi_ids array index.\n\nFix by clearing the NLP_REG_LOGIN_SEND nlp_flag in\nlpfc_mbx_cmpl_fc_reg_login().",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47198",
          "url": "https://www.suse.com/security/cve/CVE-2021-47198"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222883 for CVE-2021-47198",
          "url": "https://bugzilla.suse.com/1222883"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:29:53Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47198"
    },
    {
      "cve": "CVE-2021-47199",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47199"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/mlx5e: CT, Fix multiple allocations and memleak of mod acts\n\nCT clear action offload adds additional mod hdr actions to the\nflow\u0027s original mod actions in order to clear the registers which\nhold ct_state.\nWhen such flow also includes encap action, a neigh update event\ncan cause the driver to unoffload the flow and then reoffload it.\n\nEach time this happens, the ct clear handling adds that same set\nof mod hdr actions to reset ct_state until the max of mod hdr\nactions is reached.\n\nAlso the driver never releases the allocated mod hdr actions and\ncausing a memleak.\n\nFix above two issues by moving CT clear mod acts allocation\ninto the parsing actions phase and only use it when offloading the rule.\nThe release of mod acts will be done in the normal flow_put().\n\n backtrace:\n    [\u003c000000007316e2f3\u003e] krealloc+0x83/0xd0\n    [\u003c00000000ef157de1\u003e] mlx5e_mod_hdr_alloc+0x147/0x300 [mlx5_core]\n    [\u003c00000000970ce4ae\u003e] mlx5e_tc_match_to_reg_set_and_get_id+0xd7/0x240 [mlx5_core]\n    [\u003c0000000067c5fa17\u003e] mlx5e_tc_match_to_reg_set+0xa/0x20 [mlx5_core]\n    [\u003c00000000d032eb98\u003e] mlx5_tc_ct_entry_set_registers.isra.0+0x36/0xc0 [mlx5_core]\n    [\u003c00000000fd23b869\u003e] mlx5_tc_ct_flow_offload+0x272/0x1f10 [mlx5_core]\n    [\u003c000000004fc24acc\u003e] mlx5e_tc_offload_fdb_rules.part.0+0x150/0x620 [mlx5_core]\n    [\u003c00000000dc741c17\u003e] mlx5e_tc_encap_flows_add+0x489/0x690 [mlx5_core]\n    [\u003c00000000e92e49d7\u003e] mlx5e_rep_update_flows+0x6e4/0x9b0 [mlx5_core]\n    [\u003c00000000f60f5602\u003e] mlx5e_rep_neigh_update+0x39a/0x5d0 [mlx5_core]",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47199",
          "url": "https://www.suse.com/security/cve/CVE-2021-47199"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222785 for CVE-2021-47199",
          "url": "https://bugzilla.suse.com/1222785"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:29:53Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47199"
    },
    {
      "cve": "CVE-2021-47200",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47200"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/prime: Fix use after free in mmap with drm_gem_ttm_mmap\n\ndrm_gem_ttm_mmap() drops a reference to the gem object on success. If\nthe gem object\u0027s refcount == 1 on entry to drm_gem_prime_mmap(), that\ndrop will free the gem object, and the subsequent drm_gem_object_get()\nwill be a UAF. Fix by grabbing a reference before calling the mmap\nhelper.\n\nThis issue was forseen when the reference dropping was adding in\ncommit 9786b65bc61ac (\"drm/ttm: fix mmap refcounting\"):\n  \"For that to work properly the drm_gem_object_get() call in\n  drm_gem_ttm_mmap() must be moved so it happens before calling\n  obj-\u003efuncs-\u003emmap(), otherwise the gem refcount would go down\n  to zero.\"",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47200",
          "url": "https://www.suse.com/security/cve/CVE-2021-47200"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222838 for CVE-2021-47200",
          "url": "https://bugzilla.suse.com/1222838"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:29:53Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47200"
    },
    {
      "cve": "CVE-2021-47201",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47201"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\niavf: free q_vectors before queues in iavf_disable_vf\n\niavf_free_queues() clears adapter-\u003enum_active_queues, which\niavf_free_q_vectors() relies on, so swap the order of these two function\ncalls in iavf_disable_vf(). This resolves a panic encountered when the\ninterface is disabled and then later brought up again after PF\ncommunication is restored.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47201",
          "url": "https://www.suse.com/security/cve/CVE-2021-47201"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222792 for CVE-2021-47201",
          "url": "https://bugzilla.suse.com/1222792"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:29:53Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47201"
    },
    {
      "cve": "CVE-2021-47202",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47202"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nthermal: Fix NULL pointer dereferences in of_thermal_ functions\n\nof_parse_thermal_zones() parses the thermal-zones node and registers a\nthermal_zone device for each subnode. However, if a thermal zone is\nconsuming a thermal sensor and that thermal sensor device hasn\u0027t probed\nyet, an attempt to set trip_point_*_temp for that thermal zone device\ncan cause a NULL pointer dereference. Fix it.\n\n console:/sys/class/thermal/thermal_zone87 # echo 120000 \u003e trip_point_0_temp\n ...\n Unable to handle kernel NULL pointer dereference at virtual address 0000000000000020\n ...\n Call trace:\n  of_thermal_set_trip_temp+0x40/0xc4\n  trip_point_temp_store+0xc0/0x1dc\n  dev_attr_store+0x38/0x88\n  sysfs_kf_write+0x64/0xc0\n  kernfs_fop_write_iter+0x108/0x1d0\n  vfs_write+0x2f4/0x368\n  ksys_write+0x7c/0xec\n  __arm64_sys_write+0x20/0x30\n  el0_svc_common.llvm.7279915941325364641+0xbc/0x1bc\n  do_el0_svc+0x28/0xa0\n  el0_svc+0x14/0x24\n  el0_sync_handler+0x88/0xec\n  el0_sync+0x1c0/0x200\n\nWhile at it, fix the possible NULL pointer dereference in other\nfunctions as well: of_thermal_get_temp(), of_thermal_set_emul_temp(),\nof_thermal_get_trend().",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47202",
          "url": "https://www.suse.com/security/cve/CVE-2021-47202"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222878 for CVE-2021-47202",
          "url": "https://bugzilla.suse.com/1222878"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:29:53Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47202"
    },
    {
      "cve": "CVE-2021-47203",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47203"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: lpfc: Fix list_add() corruption in lpfc_drain_txq()\n\nWhen parsing the txq list in lpfc_drain_txq(), the driver attempts to pass\nthe requests to the adapter. If such an attempt fails, a local \"fail_msg\"\nstring is set and a log message output.  The job is then added to a\ncompletions list for cancellation.\n\nProcessing of any further jobs from the txq list continues, but since\n\"fail_msg\" remains set, jobs are added to the completions list regardless\nof whether a wqe was passed to the adapter.  If successfully added to\ntxcmplq, jobs are added to both lists resulting in list corruption.\n\nFix by clearing the fail_msg string after adding a job to the completions\nlist. This stops the subsequent jobs from being added to the completions\nlist unless they had an appropriate failure.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47203",
          "url": "https://www.suse.com/security/cve/CVE-2021-47203"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222881 for CVE-2021-47203",
          "url": "https://bugzilla.suse.com/1222881"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:29:53Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47203"
    },
    {
      "cve": "CVE-2021-47204",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47204"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: dpaa2-eth: fix use-after-free in dpaa2_eth_remove\n\nAccess to netdev after free_netdev() will cause use-after-free bug.\nMove debug log before free_netdev() call to avoid it.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47204",
          "url": "https://www.suse.com/security/cve/CVE-2021-47204"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222787 for CVE-2021-47204",
          "url": "https://bugzilla.suse.com/1222787"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:29:53Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47204"
    },
    {
      "cve": "CVE-2021-47205",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47205"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nclk: sunxi-ng: Unregister clocks/resets when unbinding\n\nCurrently, unbinding a CCU driver unmaps the device\u0027s MMIO region, while\nleaving its clocks/resets and their providers registered. This can cause\na page fault later when some clock operation tries to perform MMIO. Fix\nthis by separating the CCU initialization from the memory allocation,\nand then using a devres callback to unregister the clocks and resets.\n\nThis also fixes a memory leak of the `struct ccu_reset`, and uses the\ncorrect owner (the specific platform driver) for the clocks and resets.\n\nEarly OF clock providers are never unregistered, and limited error\nhandling is possible, so they are mostly unchanged. The error reporting\nis made more consistent by moving the message inside of_sunxi_ccu_probe.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47205",
          "url": "https://www.suse.com/security/cve/CVE-2021-47205"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222888 for CVE-2021-47205",
          "url": "https://bugzilla.suse.com/1222888"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:29:53Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47205"
    },
    {
      "cve": "CVE-2021-47206",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47206"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: host: ohci-tmio: check return value after calling platform_get_resource()\n\nIt will cause null-ptr-deref if platform_get_resource() returns NULL,\nwe need check the return value.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47206",
          "url": "https://www.suse.com/security/cve/CVE-2021-47206"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222894 for CVE-2021-47206",
          "url": "https://bugzilla.suse.com/1222894"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:29:53Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47206"
    },
    {
      "cve": "CVE-2021-47207",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47207"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: gus: fix null pointer dereference on pointer block\n\nThe pointer block return from snd_gf1_dma_next_block could be\nnull, so there is a potential null pointer dereference issue.\nFix this by adding a null check before dereference.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47207",
          "url": "https://www.suse.com/security/cve/CVE-2021-47207"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222790 for CVE-2021-47207",
          "url": "https://bugzilla.suse.com/1222790"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:29:53Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47207"
    },
    {
      "cve": "CVE-2021-47209",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47209"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsched/fair: Prevent dead task groups from regaining cfs_rq\u0027s\n\nKevin is reporting crashes which point to a use-after-free of a cfs_rq\nin update_blocked_averages(). Initial debugging revealed that we\u0027ve\nlive cfs_rq\u0027s (on_list=1) in an about to be kfree()\u0027d task group in\nfree_fair_sched_group(). However, it was unclear how that can happen.\n\nHis kernel config happened to lead to a layout of struct sched_entity\nthat put the \u0027my_q\u0027 member directly into the middle of the object\nwhich makes it incidentally overlap with SLUB\u0027s freelist pointer.\nThat, in combination with SLAB_FREELIST_HARDENED\u0027s freelist pointer\nmangling, leads to a reliable access violation in form of a #GP which\nmade the UAF fail fast.\n\nMichal seems to have run into the same issue[1]. He already correctly\ndiagnosed that commit a7b359fc6a37 (\"sched/fair: Correctly insert\ncfs_rq\u0027s to list on unthrottle\") is causing the preconditions for the\nUAF to happen by re-adding cfs_rq\u0027s also to task groups that have no\nmore running tasks, i.e. also to dead ones. His analysis, however,\nmisses the real root cause and it cannot be seen from the crash\nbacktrace only, as the real offender is tg_unthrottle_up() getting\ncalled via sched_cfs_period_timer() via the timer interrupt at an\ninconvenient time.\n\nWhen unregister_fair_sched_group() unlinks all cfs_rq\u0027s from the dying\ntask group, it doesn\u0027t protect itself from getting interrupted. If the\ntimer interrupt triggers while we iterate over all CPUs or after\nunregister_fair_sched_group() has finished but prior to unlinking the\ntask group, sched_cfs_period_timer() will execute and walk the list of\ntask groups, trying to unthrottle cfs_rq\u0027s, i.e. re-add them to the\ndying task group. These will later -- in free_fair_sched_group() -- be\nkfree()\u0027ed while still being linked, leading to the fireworks Kevin\nand Michal are seeing.\n\nTo fix this race, ensure the dying task group gets unlinked first.\nHowever, simply switching the order of unregistering and unlinking the\ntask group isn\u0027t sufficient, as concurrent RCU walkers might still see\nit, as can be seen below:\n\n    CPU1:                                      CPU2:\n      :                                        timer IRQ:\n      :                                          do_sched_cfs_period_timer():\n      :                                            :\n      :                                            distribute_cfs_runtime():\n      :                                              rcu_read_lock();\n      :                                              :\n      :                                              unthrottle_cfs_rq():\n    sched_offline_group():                             :\n      :                                                walk_tg_tree_from(\u2026,tg_unthrottle_up,\u2026):\n      list_del_rcu(\u0026tg-\u003elist);                           :\n (1)  :                                                  list_for_each_entry_rcu(child, \u0026parent-\u003echildren, siblings)\n      :                                                    :\n (2)  list_del_rcu(\u0026tg-\u003esiblings);                         :\n      :                                                    tg_unthrottle_up():\n      unregister_fair_sched_group():                         struct cfs_rq *cfs_rq = tg-\u003ecfs_rq[cpu_of(rq)];\n        :                                                    :\n        list_del_leaf_cfs_rq(tg-\u003ecfs_rq[cpu]);               :\n        :                                                    :\n        :                                                    if (!cfs_rq_is_decayed(cfs_rq) || cfs_rq-\u003enr_running)\n (3)    :                                                        list_add_leaf_cfs_rq(cfs_rq);\n      :                                                      :\n      :                                                    :\n      :                                                  :\n      :                                                :\n      :                           \n---truncated---",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47209",
          "url": "https://www.suse.com/security/cve/CVE-2021-47209"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222796 for CVE-2021-47209",
          "url": "https://bugzilla.suse.com/1222796"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:29:53Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47209"
    },
    {
      "cve": "CVE-2021-47210",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47210"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: typec: tipd: Remove WARN_ON in tps6598x_block_read\n\nCalling tps6598x_block_read with a higher than allowed len can be\nhandled by just returning an error. There\u0027s no need to crash systems\nwith panic-on-warn enabled.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47210",
          "url": "https://www.suse.com/security/cve/CVE-2021-47210"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222901 for CVE-2021-47210",
          "url": "https://bugzilla.suse.com/1222901"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:29:53Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47210"
    },
    {
      "cve": "CVE-2021-47211",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47211"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: usb-audio: fix null pointer dereference on pointer cs_desc\n\nThe pointer cs_desc return from snd_usb_find_clock_source could\nbe null, so there is a potential null pointer dereference issue.\nFix this by adding a null check before dereference.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47211",
          "url": "https://www.suse.com/security/cve/CVE-2021-47211"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222869 for CVE-2021-47211",
          "url": "https://bugzilla.suse.com/1222869"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:29:53Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47211"
    },
    {
      "cve": "CVE-2021-47212",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47212"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/mlx5: Update error handler for UCTX and UMEM\n\nIn the fast unload flow, the device state is set to internal error,\nwhich indicates that the driver started the destroy process.\nIn this case, when a destroy command is being executed, it should return\nMLX5_CMD_STAT_OK.\nFix MLX5_CMD_OP_DESTROY_UCTX and MLX5_CMD_OP_DESTROY_UMEM to return OK\ninstead of EIO.\n\nThis fixes a call trace in the umem release process -\n[ 2633.536695] Call Trace:\n[ 2633.537518]  ib_uverbs_remove_one+0xc3/0x140 [ib_uverbs]\n[ 2633.538596]  remove_client_context+0x8b/0xd0 [ib_core]\n[ 2633.539641]  disable_device+0x8c/0x130 [ib_core]\n[ 2633.540615]  __ib_unregister_device+0x35/0xa0 [ib_core]\n[ 2633.541640]  ib_unregister_device+0x21/0x30 [ib_core]\n[ 2633.542663]  __mlx5_ib_remove+0x38/0x90 [mlx5_ib]\n[ 2633.543640]  auxiliary_bus_remove+0x1e/0x30 [auxiliary]\n[ 2633.544661]  device_release_driver_internal+0x103/0x1f0\n[ 2633.545679]  bus_remove_device+0xf7/0x170\n[ 2633.546640]  device_del+0x181/0x410\n[ 2633.547606]  mlx5_rescan_drivers_locked.part.10+0x63/0x160 [mlx5_core]\n[ 2633.548777]  mlx5_unregister_device+0x27/0x40 [mlx5_core]\n[ 2633.549841]  mlx5_uninit_one+0x21/0xc0 [mlx5_core]\n[ 2633.550864]  remove_one+0x69/0xe0 [mlx5_core]\n[ 2633.551819]  pci_device_remove+0x3b/0xc0\n[ 2633.552731]  device_release_driver_internal+0x103/0x1f0\n[ 2633.553746]  unbind_store+0xf6/0x130\n[ 2633.554657]  kernfs_fop_write+0x116/0x190\n[ 2633.555567]  vfs_write+0xa5/0x1a0\n[ 2633.556407]  ksys_write+0x4f/0xb0\n[ 2633.557233]  do_syscall_64+0x5b/0x1a0\n[ 2633.558071]  entry_SYSCALL_64_after_hwframe+0x65/0xca\n[ 2633.559018] RIP: 0033:0x7f9977132648\n[ 2633.559821] Code: 89 02 48 c7 c0 ff ff ff ff eb b3 0f 1f 80 00 00 00 00 f3 0f 1e fa 48 8d 05 55 6f 2d 00 8b 00 85 c0 75 17 b8 01 00 00 00 0f 05 \u003c48\u003e 3d 00 f0 ff ff 77 58 c3 0f 1f 80 00 00 00 00 41 54 49 89 d4 55\n[ 2633.562332] RSP: 002b:00007fffb1a83888 EFLAGS: 00000246 ORIG_RAX: 0000000000000001\n[ 2633.563472] RAX: ffffffffffffffda RBX: 000000000000000c RCX: 00007f9977132648\n[ 2633.564541] RDX: 000000000000000c RSI: 000055b90546e230 RDI: 0000000000000001\n[ 2633.565596] RBP: 000055b90546e230 R08: 00007f9977406860 R09: 00007f9977a54740\n[ 2633.566653] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f99774056e0\n[ 2633.567692] R13: 000000000000000c R14: 00007f9977400880 R15: 000000000000000c\n[ 2633.568725] ---[ end trace 10b4fe52945e544d ]---",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47212",
          "url": "https://www.suse.com/security/cve/CVE-2021-47212"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222709 for CVE-2021-47212",
          "url": "https://bugzilla.suse.com/1222709"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:29:53Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47212"
    },
    {
      "cve": "CVE-2021-47214",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47214"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nhugetlb, userfaultfd: fix reservation restore on userfaultfd error\n\nCurrently in the is_continue case in hugetlb_mcopy_atomic_pte(), if we\nbail out using \"goto out_release_unlock;\" in the cases where idx \u003e=\nsize, or !huge_pte_none(), the code will detect that new_pagecache_page\n== false, and so call restore_reserve_on_error().  In this case I see\nrestore_reserve_on_error() delete the reservation, and the following\ncall to remove_inode_hugepages() will increment h-\u003eresv_hugepages\ncausing a 100% reproducible leak.\n\nWe should treat the is_continue case similar to adding a page into the\npagecache and set new_pagecache_page to true, to indicate that there is\nno reservation to restore on the error path, and we need not call\nrestore_reserve_on_error().  Rename new_pagecache_page to\npage_in_pagecache to make that clear.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47214",
          "url": "https://www.suse.com/security/cve/CVE-2021-47214"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222710 for CVE-2021-47214",
          "url": "https://bugzilla.suse.com/1222710"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:29:53Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47214"
    },
    {
      "cve": "CVE-2021-47215",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47215"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/mlx5e: kTLS, Fix crash in RX resync flow\n\nFor the TLS RX resync flow, we maintain a list of TLS contexts\nthat require some attention, to communicate their resync information\nto the HW.\nHere we fix list corruptions, by protecting the entries against\nmovements coming from resync_handle_seq_match(), until their resync\nhandling in napi is fully completed.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47215",
          "url": "https://www.suse.com/security/cve/CVE-2021-47215"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222704 for CVE-2021-47215",
          "url": "https://bugzilla.suse.com/1222704"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:29:53Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47215"
    },
    {
      "cve": "CVE-2021-47216",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47216"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: advansys: Fix kernel pointer leak\n\nPointers should be printed with %p or %px rather than cast to \u0027unsigned\nlong\u0027 and printed with %lx.\n\nChange %lx to %p to print the hashed pointer.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47216",
          "url": "https://www.suse.com/security/cve/CVE-2021-47216"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222876 for CVE-2021-47216",
          "url": "https://bugzilla.suse.com/1222876"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:29:53Z",
          "details": "low"
        }
      ],
      "title": "CVE-2021-47216"
    },
    {
      "cve": "CVE-2021-47217",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47217"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nx86/hyperv: Fix NULL deref in set_hv_tscchange_cb() if Hyper-V setup fails\n\nCheck for a valid hv_vp_index array prior to derefencing hv_vp_index when\nsetting Hyper-V\u0027s TSC change callback.  If Hyper-V setup failed in\nhyperv_init(), the kernel will still report that it\u0027s running under\nHyper-V, but will have silently disabled nearly all functionality.\n\n  BUG: kernel NULL pointer dereference, address: 0000000000000010\n  #PF: supervisor read access in kernel mode\n  #PF: error_code(0x0000) - not-present page\n  PGD 0 P4D 0\n  Oops: 0000 [#1] SMP\n  CPU: 4 PID: 1 Comm: swapper/0 Not tainted 5.15.0-rc2+ #75\n  Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 0.0.0 02/06/2015\n  RIP: 0010:set_hv_tscchange_cb+0x15/0xa0\n  Code: \u003c8b\u003e 04 82 8b 15 12 17 85 01 48 c1 e0 20 48 0d ee 00 01 00 f6 c6 08\n  ...\n  Call Trace:\n   kvm_arch_init+0x17c/0x280\n   kvm_init+0x31/0x330\n   vmx_init+0xba/0x13a\n   do_one_initcall+0x41/0x1c0\n   kernel_init_freeable+0x1f2/0x23b\n   kernel_init+0x16/0x120\n   ret_from_fork+0x22/0x30",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47217",
          "url": "https://www.suse.com/security/cve/CVE-2021-47217"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222836 for CVE-2021-47217",
          "url": "https://bugzilla.suse.com/1222836"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:29:53Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47217"
    },
    {
      "cve": "CVE-2021-47218",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47218"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nselinux: fix NULL-pointer dereference when hashtab allocation fails\n\nWhen the hash table slot array allocation fails in hashtab_init(),\nh-\u003esize is left initialized with a non-zero value, but the h-\u003ehtable\npointer is NULL. This may then cause a NULL pointer dereference, since\nthe policydb code relies on the assumption that even after a failed\nhashtab_init(), hashtab_map() and hashtab_destroy() can be safely called\non it. Yet, these detect an empty hashtab only by looking at the size.\n\nFix this by making sure that hashtab_init() always leaves behind a valid\nempty hashtab when the allocation fails.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47218",
          "url": "https://www.suse.com/security/cve/CVE-2021-47218"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222791 for CVE-2021-47218",
          "url": "https://bugzilla.suse.com/1222791"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:29:53Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47218"
    },
    {
      "cve": "CVE-2021-47219",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47219"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: scsi_debug: Fix out-of-bound read in resp_report_tgtpgs()\n\nThe following issue was observed running syzkaller:\n\nBUG: KASAN: slab-out-of-bounds in memcpy include/linux/string.h:377 [inline]\nBUG: KASAN: slab-out-of-bounds in sg_copy_buffer+0x150/0x1c0 lib/scatterlist.c:831\nRead of size 2132 at addr ffff8880aea95dc8 by task syz-executor.0/9815\n\nCPU: 0 PID: 9815 Comm: syz-executor.0 Not tainted 4.19.202-00874-gfc0fe04215a9 #2\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.10.2-1ubuntu1 04/01/2014\nCall Trace:\n __dump_stack lib/dump_stack.c:77 [inline]\n dump_stack+0xe4/0x14a lib/dump_stack.c:118\n print_address_description+0x73/0x280 mm/kasan/report.c:253\n kasan_report_error mm/kasan/report.c:352 [inline]\n kasan_report+0x272/0x370 mm/kasan/report.c:410\n memcpy+0x1f/0x50 mm/kasan/kasan.c:302\n memcpy include/linux/string.h:377 [inline]\n sg_copy_buffer+0x150/0x1c0 lib/scatterlist.c:831\n fill_from_dev_buffer+0x14f/0x340 drivers/scsi/scsi_debug.c:1021\n resp_report_tgtpgs+0x5aa/0x770 drivers/scsi/scsi_debug.c:1772\n schedule_resp+0x464/0x12f0 drivers/scsi/scsi_debug.c:4429\n scsi_debug_queuecommand+0x467/0x1390 drivers/scsi/scsi_debug.c:5835\n scsi_dispatch_cmd+0x3fc/0x9b0 drivers/scsi/scsi_lib.c:1896\n scsi_request_fn+0x1042/0x1810 drivers/scsi/scsi_lib.c:2034\n __blk_run_queue_uncond block/blk-core.c:464 [inline]\n __blk_run_queue+0x1a4/0x380 block/blk-core.c:484\n blk_execute_rq_nowait+0x1c2/0x2d0 block/blk-exec.c:78\n sg_common_write.isra.19+0xd74/0x1dc0 drivers/scsi/sg.c:847\n sg_write.part.23+0x6e0/0xd00 drivers/scsi/sg.c:716\n sg_write+0x64/0xa0 drivers/scsi/sg.c:622\n __vfs_write+0xed/0x690 fs/read_write.c:485\nkill_bdev:block_device:00000000e138492c\n vfs_write+0x184/0x4c0 fs/read_write.c:549\n ksys_write+0x107/0x240 fs/read_write.c:599\n do_syscall_64+0xc2/0x560 arch/x86/entry/common.c:293\n entry_SYSCALL_64_after_hwframe+0x49/0xbe\n\nWe get \u0027alen\u0027 from command its type is int. If userspace passes a large\nlength we will get a negative \u0027alen\u0027.\n\nSwitch n, alen, and rlen to u32.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47219",
          "url": "https://www.suse.com/security/cve/CVE-2021-47219"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222824 for CVE-2021-47219",
          "url": "https://bugzilla.suse.com/1222824"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:29:53Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47219"
    },
    {
      "cve": "CVE-2022-48631",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-48631"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\next4: fix bug in extents parsing when eh_entries == 0 and eh_depth \u003e 0\n\nWhen walking through an inode extents, the ext4_ext_binsearch_idx() function\nassumes that the extent header has been previously validated.  However, there\nare no checks that verify that the number of entries (eh-\u003eeh_entries) is\nnon-zero when depth is \u003e 0.  And this will lead to problems because the\nEXT_FIRST_INDEX() and EXT_LAST_INDEX() will return garbage and result in this:\n\n[  135.245946] ------------[ cut here ]------------\n[  135.247579] kernel BUG at fs/ext4/extents.c:2258!\n[  135.249045] invalid opcode: 0000 [#1] PREEMPT SMP\n[  135.250320] CPU: 2 PID: 238 Comm: tmp118 Not tainted 5.19.0-rc8+ #4\n[  135.252067] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.15.0-0-g2dd4b9b-rebuilt.opensuse.org 04/01/2014\n[  135.255065] RIP: 0010:ext4_ext_map_blocks+0xc20/0xcb0\n[  135.256475] Code:\n[  135.261433] RSP: 0018:ffffc900005939f8 EFLAGS: 00010246\n[  135.262847] RAX: 0000000000000024 RBX: ffffc90000593b70 RCX: 0000000000000023\n[  135.264765] RDX: ffff8880038e5f10 RSI: 0000000000000003 RDI: ffff8880046e922c\n[  135.266670] RBP: ffff8880046e9348 R08: 0000000000000001 R09: ffff888002ca580c\n[  135.268576] R10: 0000000000002602 R11: 0000000000000000 R12: 0000000000000024\n[  135.270477] R13: 0000000000000000 R14: 0000000000000024 R15: 0000000000000000\n[  135.272394] FS:  00007fdabdc56740(0000) GS:ffff88807dd00000(0000) knlGS:0000000000000000\n[  135.274510] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[  135.276075] CR2: 00007ffc26bd4f00 CR3: 0000000006261004 CR4: 0000000000170ea0\n[  135.277952] Call Trace:\n[  135.278635]  \u003cTASK\u003e\n[  135.279247]  ? preempt_count_add+0x6d/0xa0\n[  135.280358]  ? percpu_counter_add_batch+0x55/0xb0\n[  135.281612]  ? _raw_read_unlock+0x18/0x30\n[  135.282704]  ext4_map_blocks+0x294/0x5a0\n[  135.283745]  ? xa_load+0x6f/0xa0\n[  135.284562]  ext4_mpage_readpages+0x3d6/0x770\n[  135.285646]  read_pages+0x67/0x1d0\n[  135.286492]  ? folio_add_lru+0x51/0x80\n[  135.287441]  page_cache_ra_unbounded+0x124/0x170\n[  135.288510]  filemap_get_pages+0x23d/0x5a0\n[  135.289457]  ? path_openat+0xa72/0xdd0\n[  135.290332]  filemap_read+0xbf/0x300\n[  135.291158]  ? _raw_spin_lock_irqsave+0x17/0x40\n[  135.292192]  new_sync_read+0x103/0x170\n[  135.293014]  vfs_read+0x15d/0x180\n[  135.293745]  ksys_read+0xa1/0xe0\n[  135.294461]  do_syscall_64+0x3c/0x80\n[  135.295284]  entry_SYSCALL_64_after_hwframe+0x46/0xb0\n\nThis patch simply adds an extra check in __ext4_ext_check(), verifying that\neh_entries is not 0 when eh_depth is \u003e 0.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-48631",
          "url": "https://www.suse.com/security/cve/CVE-2022-48631"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223475 for CVE-2022-48631",
          "url": "https://bugzilla.suse.com/1223475"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:29:53Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-48631"
    },
    {
      "cve": "CVE-2022-48632",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-48632"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ni2c: mlxbf: prevent stack overflow in mlxbf_i2c_smbus_start_transaction()\n\nmemcpy() is called in a loop while \u0027operation-\u003elength\u0027 upper bound\nis not checked and \u0027data_idx\u0027 also increments.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-48632",
          "url": "https://www.suse.com/security/cve/CVE-2022-48632"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223481 for CVE-2022-48632",
          "url": "https://bugzilla.suse.com/1223481"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:29:53Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-48632"
    },
    {
      "cve": "CVE-2022-48634",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-48634"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/gma500: Fix BUG: sleeping function called from invalid context errors\n\ngma_crtc_page_flip() was holding the event_lock spinlock while calling\ncrtc_funcs-\u003emode_set_base() which takes ww_mutex.\n\nThe only reason to hold event_lock is to clear gma_crtc-\u003epage_flip_event\non mode_set_base() errors.\n\nInstead unlock it after setting gma_crtc-\u003epage_flip_event and on\nerrors re-take the lock and clear gma_crtc-\u003epage_flip_event it\nit is still set.\n\nThis fixes the following WARN/stacktrace:\n\n[  512.122953] BUG: sleeping function called from invalid context at kernel/locking/mutex.c:870\n[  512.123004] in_atomic(): 1, irqs_disabled(): 1, non_block: 0, pid: 1253, name: gnome-shell\n[  512.123031] preempt_count: 1, expected: 0\n[  512.123048] RCU nest depth: 0, expected: 0\n[  512.123066] INFO: lockdep is turned off.\n[  512.123080] irq event stamp: 0\n[  512.123094] hardirqs last  enabled at (0): [\u003c0000000000000000\u003e] 0x0\n[  512.123134] hardirqs last disabled at (0): [\u003cffffffff8d0ec28c\u003e] copy_process+0x9fc/0x1de0\n[  512.123176] softirqs last  enabled at (0): [\u003cffffffff8d0ec28c\u003e] copy_process+0x9fc/0x1de0\n[  512.123207] softirqs last disabled at (0): [\u003c0000000000000000\u003e] 0x0\n[  512.123233] Preemption disabled at:\n[  512.123241] [\u003c0000000000000000\u003e] 0x0\n[  512.123275] CPU: 3 PID: 1253 Comm: gnome-shell Tainted: G        W         5.19.0+ #1\n[  512.123304] Hardware name: Packard Bell dot s/SJE01_CT, BIOS V1.10 07/23/2013\n[  512.123323] Call Trace:\n[  512.123346]  \u003cTASK\u003e\n[  512.123370]  dump_stack_lvl+0x5b/0x77\n[  512.123412]  __might_resched.cold+0xff/0x13a\n[  512.123458]  ww_mutex_lock+0x1e/0xa0\n[  512.123495]  psb_gem_pin+0x2c/0x150 [gma500_gfx]\n[  512.123601]  gma_pipe_set_base+0x76/0x240 [gma500_gfx]\n[  512.123708]  gma_crtc_page_flip+0x95/0x130 [gma500_gfx]\n[  512.123808]  drm_mode_page_flip_ioctl+0x57d/0x5d0\n[  512.123897]  ? drm_mode_cursor2_ioctl+0x10/0x10\n[  512.123936]  drm_ioctl_kernel+0xa1/0x150\n[  512.123984]  drm_ioctl+0x21f/0x420\n[  512.124025]  ? drm_mode_cursor2_ioctl+0x10/0x10\n[  512.124070]  ? rcu_read_lock_bh_held+0xb/0x60\n[  512.124104]  ? lock_release+0x1ef/0x2d0\n[  512.124161]  __x64_sys_ioctl+0x8d/0xd0\n[  512.124203]  do_syscall_64+0x58/0x80\n[  512.124239]  ? do_syscall_64+0x67/0x80\n[  512.124267]  ? trace_hardirqs_on_prepare+0x55/0xe0\n[  512.124300]  ? do_syscall_64+0x67/0x80\n[  512.124340]  ? rcu_read_lock_sched_held+0x10/0x80\n[  512.124377]  entry_SYSCALL_64_after_hwframe+0x63/0xcd\n[  512.124411] RIP: 0033:0x7fcc4a70740f\n[  512.124442] Code: 00 48 89 44 24 18 31 c0 48 8d 44 24 60 c7 04 24 10 00 00 00 48 89 44 24 08 48 8d 44 24 20 48 89 44 24 10 b8 10 00 00 00 0f 05 \u003c89\u003e c2 3d 00 f0 ff ff 77 18 48 8b 44 24 18 64 48 2b 04 25 28 00 00\n[  512.124470] RSP: 002b:00007ffda73f5390 EFLAGS: 00000246 ORIG_RAX: 0000000000000010\n[  512.124503] RAX: ffffffffffffffda RBX: 000055cc9e474500 RCX: 00007fcc4a70740f\n[  512.124524] RDX: 00007ffda73f5420 RSI: 00000000c01864b0 RDI: 0000000000000009\n[  512.124544] RBP: 00007ffda73f5420 R08: 000055cc9c0b0cb0 R09: 0000000000000034\n[  512.124564] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000c01864b0\n[  512.124584] R13: 0000000000000009 R14: 000055cc9df484d0 R15: 000055cc9af5d0c0\n[  512.124647]  \u003c/TASK\u003e",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-48634",
          "url": "https://www.suse.com/security/cve/CVE-2022-48634"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223501 for CVE-2022-48634",
          "url": "https://bugzilla.suse.com/1223501"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:29:53Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-48634"
    },
    {
      "cve": "CVE-2022-48636",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-48636"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ns390/dasd: fix Oops in dasd_alias_get_start_dev due to missing pavgroup\n\nFix Oops in dasd_alias_get_start_dev() function caused by the pavgroup\npointer being NULL.\n\nThe pavgroup pointer is checked on the entrance of the function but\nwithout the lcu-\u003elock being held. Therefore there is a race window\nbetween dasd_alias_get_start_dev() and _lcu_update() which sets\npavgroup to NULL with the lcu-\u003elock held.\n\nFix by checking the pavgroup pointer with lcu-\u003elock held.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-48636",
          "url": "https://www.suse.com/security/cve/CVE-2022-48636"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223512 for CVE-2022-48636",
          "url": "https://bugzilla.suse.com/1223512"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:29:53Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-48636"
    },
    {
      "cve": "CVE-2022-48637",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-48637"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbnxt: prevent skb UAF after handing over to PTP worker\n\nWhen reading the timestamp is required bnxt_tx_int() hands\nover the ownership of the completed skb to the PTP worker.\nThe skb should not be used afterwards, as the worker may\nrun before the rest of our code and free the skb, leading\nto a use-after-free.\n\nSince dev_kfree_skb_any() accepts NULL make the loss of\nownership more obvious and set skb to NULL.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-48637",
          "url": "https://www.suse.com/security/cve/CVE-2022-48637"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223517 for CVE-2022-48637",
          "url": "https://bugzilla.suse.com/1223517"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:29:53Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-48637"
    },
    {
      "cve": "CVE-2022-48638",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-48638"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncgroup: cgroup_get_from_id() must check the looked-up kn is a directory\n\ncgroup has to be one kernfs dir, otherwise kernel panic is caused,\nespecially cgroup id is provide from userspace.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-48638",
          "url": "https://www.suse.com/security/cve/CVE-2022-48638"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223522 for CVE-2022-48638",
          "url": "https://bugzilla.suse.com/1223522"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:29:53Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-48638"
    },
    {
      "cve": "CVE-2022-48639",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-48639"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: sched: fix possible refcount leak in tc_new_tfilter()\n\ntfilter_put need to be called to put the refount got by tp-\u003eops-\u003eget to\navoid possible refcount leak when chain-\u003etmplt_ops != NULL and\nchain-\u003etmplt_ops != tp-\u003eops.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-48639",
          "url": "https://www.suse.com/security/cve/CVE-2022-48639"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223490 for CVE-2022-48639",
          "url": "https://bugzilla.suse.com/1223490"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:29:53Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-48639"
    },
    {
      "cve": "CVE-2022-48640",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-48640"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbonding: fix NULL deref in bond_rr_gen_slave_id\n\nFix a NULL dereference of the struct bonding.rr_tx_counter member because\nif a bond is initially created with an initial mode != zero (Round Robin)\nthe memory required for the counter is never created and when the mode is\nchanged there is never any attempt to verify the memory is allocated upon\nswitching modes.\n\nThis causes the following Oops on an aarch64 machine:\n    [  334.686773] Unable to handle kernel paging request at virtual address ffff2c91ac905000\n    [  334.694703] Mem abort info:\n    [  334.697486]   ESR = 0x0000000096000004\n    [  334.701234]   EC = 0x25: DABT (current EL), IL = 32 bits\n    [  334.706536]   SET = 0, FnV = 0\n    [  334.709579]   EA = 0, S1PTW = 0\n    [  334.712719]   FSC = 0x04: level 0 translation fault\n    [  334.717586] Data abort info:\n    [  334.720454]   ISV = 0, ISS = 0x00000004\n    [  334.724288]   CM = 0, WnR = 0\n    [  334.727244] swapper pgtable: 4k pages, 48-bit VAs, pgdp=000008044d662000\n    [  334.733944] [ffff2c91ac905000] pgd=0000000000000000, p4d=0000000000000000\n    [  334.740734] Internal error: Oops: 96000004 [#1] SMP\n    [  334.745602] Modules linked in: bonding tls veth rfkill sunrpc arm_spe_pmu vfat fat acpi_ipmi ipmi_ssif ixgbe igb i40e mdio ipmi_devintf ipmi_msghandler arm_cmn arm_dsu_pmu cppc_cpufreq acpi_tad fuse zram crct10dif_ce ast ghash_ce sbsa_gwdt nvme drm_vram_helper drm_ttm_helper nvme_core ttm xgene_hwmon\n    [  334.772217] CPU: 7 PID: 2214 Comm: ping Not tainted 6.0.0-rc4-00133-g64ae13ed4784 #4\n    [  334.779950] Hardware name: GIGABYTE R272-P31-00/MP32-AR1-00, BIOS F18v (SCP: 1.08.20211002) 12/01/2021\n    [  334.789244] pstate: 60400009 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)\n    [  334.796196] pc : bond_rr_gen_slave_id+0x40/0x124 [bonding]\n    [  334.801691] lr : bond_xmit_roundrobin_slave_get+0x38/0xdc [bonding]\n    [  334.807962] sp : ffff8000221733e0\n    [  334.811265] x29: ffff8000221733e0 x28: ffffdbac8572d198 x27: ffff80002217357c\n    [  334.818392] x26: 000000000000002a x25: ffffdbacb33ee000 x24: ffff07ff980fa000\n    [  334.825519] x23: ffffdbacb2e398ba x22: ffff07ff98102000 x21: ffff07ff981029c0\n    [  334.832646] x20: 0000000000000001 x19: ffff07ff981029c0 x18: 0000000000000014\n    [  334.839773] x17: 0000000000000000 x16: ffffdbacb1004364 x15: 0000aaaabe2f5a62\n    [  334.846899] x14: ffff07ff8e55d968 x13: ffff07ff8e55db30 x12: 0000000000000000\n    [  334.854026] x11: ffffdbacb21532e8 x10: 0000000000000001 x9 : ffffdbac857178ec\n    [  334.861153] x8 : ffff07ff9f6e5a28 x7 : 0000000000000000 x6 : 000000007c2b3742\n    [  334.868279] x5 : ffff2c91ac905000 x4 : ffff2c91ac905000 x3 : ffff07ff9f554400\n    [  334.875406] x2 : ffff2c91ac905000 x1 : 0000000000000001 x0 : ffff07ff981029c0\n    [  334.882532] Call trace:\n    [  334.884967]  bond_rr_gen_slave_id+0x40/0x124 [bonding]\n    [  334.890109]  bond_xmit_roundrobin_slave_get+0x38/0xdc [bonding]\n    [  334.896033]  __bond_start_xmit+0x128/0x3a0 [bonding]\n    [  334.901001]  bond_start_xmit+0x54/0xb0 [bonding]\n    [  334.905622]  dev_hard_start_xmit+0xb4/0x220\n    [  334.909798]  __dev_queue_xmit+0x1a0/0x720\n    [  334.913799]  arp_xmit+0x3c/0xbc\n    [  334.916932]  arp_send_dst+0x98/0xd0\n    [  334.920410]  arp_solicit+0xe8/0x230\n    [  334.923888]  neigh_probe+0x60/0xb0\n    [  334.927279]  __neigh_event_send+0x3b0/0x470\n    [  334.931453]  neigh_resolve_output+0x70/0x90\n    [  334.935626]  ip_finish_output2+0x158/0x514\n    [  334.939714]  __ip_finish_output+0xac/0x1a4\n    [  334.943800]  ip_finish_output+0x40/0xfc\n    [  334.947626]  ip_output+0xf8/0x1a4\n    [  334.950931]  ip_send_skb+0x5c/0x100\n    [  334.954410]  ip_push_pending_frames+0x3c/0x60\n    [  334.958758]  raw_sendmsg+0x458/0x6d0\n    [  334.962325]  inet_sendmsg+0x50/0x80\n    [  334.965805]  sock_sendmsg+0x60/0x6c\n    [  334.969286]  __sys_sendto+0xc8/0x134\n    [  334.972853]  __arm64_sys_sendto+0x34/0x4c\n---truncated---",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-48640",
          "url": "https://www.suse.com/security/cve/CVE-2022-48640"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223499 for CVE-2022-48640",
          "url": "https://bugzilla.suse.com/1223499"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:29:53Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-48640"
    },
    {
      "cve": "CVE-2022-48642",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-48642"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nf_tables: fix percpu memory leak at nf_tables_addchain()\n\nIt seems to me that percpu memory for chain stats started leaking since\ncommit 3bc158f8d0330f0a (\"netfilter: nf_tables: map basechain priority to\nhardware priority\") when nft_chain_offload_priority() returned an error.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-48642",
          "url": "https://www.suse.com/security/cve/CVE-2022-48642"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223478 for CVE-2022-48642",
          "url": "https://bugzilla.suse.com/1223478"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:29:53Z",
          "details": "low"
        }
      ],
      "title": "CVE-2022-48642"
    },
    {
      "cve": "CVE-2022-48644",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-48644"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/sched: taprio: avoid disabling offload when it was never enabled\n\nIn an incredibly strange API design decision, qdisc-\u003edestroy() gets\ncalled even if qdisc-\u003einit() never succeeded, not exclusively since\ncommit 87b60cfacf9f (\"net_sched: fix error recovery at qdisc creation\"),\nbut apparently also earlier (in the case of qdisc_create_dflt()).\n\nThe taprio qdisc does not fully acknowledge this when it attempts full\noffload, because it starts off with q-\u003eflags = TAPRIO_FLAGS_INVALID in\ntaprio_init(), then it replaces q-\u003eflags with TCA_TAPRIO_ATTR_FLAGS\nparsed from netlink (in taprio_change(), tail called from taprio_init()).\n\nBut in taprio_destroy(), we call taprio_disable_offload(), and this\ndetermines what to do based on FULL_OFFLOAD_IS_ENABLED(q-\u003eflags).\n\nBut looking at the implementation of FULL_OFFLOAD_IS_ENABLED()\n(a bitwise check of bit 1 in q-\u003eflags), it is invalid to call this macro\non q-\u003eflags when it contains TAPRIO_FLAGS_INVALID, because that is set\nto U32_MAX, and therefore FULL_OFFLOAD_IS_ENABLED() will return true on\nan invalid set of flags.\n\nAs a result, it is possible to crash the kernel if user space forces an\nerror between setting q-\u003eflags = TAPRIO_FLAGS_INVALID, and the calling\nof taprio_enable_offload(). This is because drivers do not expect the\noffload to be disabled when it was never enabled.\n\nThe error that we force here is to attach taprio as a non-root qdisc,\nbut instead as child of an mqprio root qdisc:\n\n$ tc qdisc add dev swp0 root handle 1: \\\n\tmqprio num_tc 8 map 0 1 2 3 4 5 6 7 \\\n\tqueues 1@0 1@1 1@2 1@3 1@4 1@5 1@6 1@7 hw 0\n$ tc qdisc replace dev swp0 parent 1:1 \\\n\ttaprio num_tc 8 map 0 1 2 3 4 5 6 7 \\\n\tqueues 1@0 1@1 1@2 1@3 1@4 1@5 1@6 1@7 base-time 0 \\\n\tsched-entry S 0x7f 990000 sched-entry S 0x80 100000 \\\n\tflags 0x0 clockid CLOCK_TAI\nUnable to handle kernel paging request at virtual address fffffffffffffff8\n[fffffffffffffff8] pgd=0000000000000000, p4d=0000000000000000\nInternal error: Oops: 96000004 [#1] PREEMPT SMP\nCall trace:\n taprio_dump+0x27c/0x310\n vsc9959_port_setup_tc+0x1f4/0x460\n felix_port_setup_tc+0x24/0x3c\n dsa_slave_setup_tc+0x54/0x27c\n taprio_disable_offload.isra.0+0x58/0xe0\n taprio_destroy+0x80/0x104\n qdisc_create+0x240/0x470\n tc_modify_qdisc+0x1fc/0x6b0\n rtnetlink_rcv_msg+0x12c/0x390\n netlink_rcv_skb+0x5c/0x130\n rtnetlink_rcv+0x1c/0x2c\n\nFix this by keeping track of the operations we made, and undo the\noffload only if we actually did it.\n\nI\u0027ve added \"bool offloaded\" inside a 4 byte hole between \"int clockid\"\nand \"atomic64_t picos_per_byte\". Now the first cache line looks like\nbelow:\n\n$ pahole -C taprio_sched net/sched/sch_taprio.o\nstruct taprio_sched {\n        struct Qdisc * *           qdiscs;               /*     0     8 */\n        struct Qdisc *             root;                 /*     8     8 */\n        u32                        flags;                /*    16     4 */\n        enum tk_offsets            tk_offset;            /*    20     4 */\n        int                        clockid;              /*    24     4 */\n        bool                       offloaded;            /*    28     1 */\n\n        /* XXX 3 bytes hole, try to pack */\n\n        atomic64_t                 picos_per_byte;       /*    32     0 */\n\n        /* XXX 8 bytes hole, try to pack */\n\n        spinlock_t                 current_entry_lock;   /*    40     0 */\n\n        /* XXX 8 bytes hole, try to pack */\n\n        struct sched_entry *       current_entry;        /*    48     8 */\n        struct sched_gate_list *   oper_sched;           /*    56     8 */\n        /* --- cacheline 1 boundary (64 bytes) --- */",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-48644",
          "url": "https://www.suse.com/security/cve/CVE-2022-48644"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223511 for CVE-2022-48644",
          "url": "https://bugzilla.suse.com/1223511"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:29:53Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-48644"
    },
    {
      "cve": "CVE-2022-48646",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-48646"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsfc/siena: fix null pointer dereference in efx_hard_start_xmit\n\nLike in previous patch for sfc, prevent potential (but unlikely) NULL\npointer dereference.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-48646",
          "url": "https://www.suse.com/security/cve/CVE-2022-48646"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223502 for CVE-2022-48646",
          "url": "https://bugzilla.suse.com/1223502"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:29:53Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-48646"
    },
    {
      "cve": "CVE-2022-48647",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-48647"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsfc: fix TX channel offset when using legacy interrupts\n\nIn legacy interrupt mode the tx_channel_offset was hardcoded to 1, but\nthat\u0027s not correct if efx_sepparate_tx_channels is false. In that case,\nthe offset is 0 because the tx queues are in the single existing channel\nat index 0, together with the rx queue.\n\nWithout this fix, as soon as you try to send any traffic, it tries to\nget the tx queues from an uninitialized channel getting these errors:\n  WARNING: CPU: 1 PID: 0 at drivers/net/ethernet/sfc/tx.c:540 efx_hard_start_xmit+0x12e/0x170 [sfc]\n  [...]\n  RIP: 0010:efx_hard_start_xmit+0x12e/0x170 [sfc]\n  [...]\n  Call Trace:\n   \u003cIRQ\u003e\n   dev_hard_start_xmit+0xd7/0x230\n   sch_direct_xmit+0x9f/0x360\n   __dev_queue_xmit+0x890/0xa40\n  [...]\n  BUG: unable to handle kernel NULL pointer dereference at 0000000000000020\n  [...]\n  RIP: 0010:efx_hard_start_xmit+0x153/0x170 [sfc]\n  [...]\n  Call Trace:\n   \u003cIRQ\u003e\n   dev_hard_start_xmit+0xd7/0x230\n   sch_direct_xmit+0x9f/0x360\n   __dev_queue_xmit+0x890/0xa40\n  [...]",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-48647",
          "url": "https://www.suse.com/security/cve/CVE-2022-48647"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223519 for CVE-2022-48647",
          "url": "https://bugzilla.suse.com/1223519"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:29:53Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-48647"
    },
    {
      "cve": "CVE-2022-48648",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-48648"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsfc: fix null pointer dereference in efx_hard_start_xmit\n\nTrying to get the channel from the tx_queue variable here is wrong\nbecause we can only be here if tx_queue is NULL, so we shouldn\u0027t\ndereference it. As the above comment in the code says, this is very\nunlikely to happen, but it\u0027s wrong anyway so let\u0027s fix it.\n\nI hit this issue because of a different bug that caused tx_queue to be\nNULL. If that happens, this is the error message that we get here:\n  BUG: unable to handle kernel NULL pointer dereference at 0000000000000020\n  [...]\n  RIP: 0010:efx_hard_start_xmit+0x153/0x170 [sfc]",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-48648",
          "url": "https://www.suse.com/security/cve/CVE-2022-48648"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223503 for CVE-2022-48648",
          "url": "https://bugzilla.suse.com/1223503"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:29:53Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-48648"
    },
    {
      "cve": "CVE-2022-48650",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-48650"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: qla2xxx: Fix memory leak in __qlt_24xx_handle_abts()\n\nCommit 8f394da36a36 (\"scsi: qla2xxx: Drop TARGET_SCF_LOOKUP_LUN_FROM_TAG\")\nmade the __qlt_24xx_handle_abts() function return early if\ntcm_qla2xxx_find_cmd_by_tag() didn\u0027t find a command, but it missed to clean\nup the allocated memory for the management command.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-48650",
          "url": "https://www.suse.com/security/cve/CVE-2022-48650"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223509 for CVE-2022-48650",
          "url": "https://bugzilla.suse.com/1223509"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:29:53Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-48650"
    },
    {
      "cve": "CVE-2022-48651",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-48651"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipvlan: Fix out-of-bound bugs caused by unset skb-\u003emac_header\n\nIf an AF_PACKET socket is used to send packets through ipvlan and the\ndefault xmit function of the AF_PACKET socket is changed from\ndev_queue_xmit() to packet_direct_xmit() via setsockopt() with the option\nname of PACKET_QDISC_BYPASS, the skb-\u003emac_header may not be reset and\nremains as the initial value of 65535, this may trigger slab-out-of-bounds\nbugs as following:\n\n=================================================================\nUG: KASAN: slab-out-of-bounds in ipvlan_xmit_mode_l2+0xdb/0x330 [ipvlan]\nPU: 2 PID: 1768 Comm: raw_send Kdump: loaded Not tainted 6.0.0-rc4+ #6\nardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.14.0-1.fc33\nall Trace:\nprint_address_description.constprop.0+0x1d/0x160\nprint_report.cold+0x4f/0x112\nkasan_report+0xa3/0x130\nipvlan_xmit_mode_l2+0xdb/0x330 [ipvlan]\nipvlan_start_xmit+0x29/0xa0 [ipvlan]\n__dev_direct_xmit+0x2e2/0x380\npacket_direct_xmit+0x22/0x60\npacket_snd+0x7c9/0xc40\nsock_sendmsg+0x9a/0xa0\n__sys_sendto+0x18a/0x230\n__x64_sys_sendto+0x74/0x90\ndo_syscall_64+0x3b/0x90\nentry_SYSCALL_64_after_hwframe+0x63/0xcd\n\nThe root cause is:\n  1. packet_snd() only reset skb-\u003emac_header when sock-\u003etype is SOCK_RAW\n     and skb-\u003eprotocol is not specified as in packet_parse_headers()\n\n  2. packet_direct_xmit() doesn\u0027t reset skb-\u003emac_header as dev_queue_xmit()\n\nIn this case, skb-\u003emac_header is 65535 when ipvlan_xmit_mode_l2() is\ncalled. So when ipvlan_xmit_mode_l2() gets mac header with eth_hdr() which\nuse \"skb-\u003ehead + skb-\u003emac_header\", out-of-bound access occurs.\n\nThis patch replaces eth_hdr() with skb_eth_hdr() in ipvlan_xmit_mode_l2()\nand reset mac header in multicast to solve this out-of-bound bug.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-48651",
          "url": "https://www.suse.com/security/cve/CVE-2022-48651"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223513 for CVE-2022-48651",
          "url": "https://bugzilla.suse.com/1223513"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223514 for CVE-2022-48651",
          "url": "https://bugzilla.suse.com/1223514"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:29:53Z",
          "details": "important"
        }
      ],
      "title": "CVE-2022-48651"
    },
    {
      "cve": "CVE-2022-48652",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-48652"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nice: Fix crash by keep old cfg when update TCs more than queues\n\nThere are problems if allocated queues less than Traffic Classes.\n\nCommit a632b2a4c920 (\"ice: ethtool: Prohibit improper channel config\nfor DCB\") already disallow setting less queues than TCs.\n\nAnother case is if we first set less queues, and later update more TCs\nconfig due to LLDP, ice_vsi_cfg_tc() will failed but left dirty\nnum_txq/rxq and tc_cfg in vsi, that will cause invalid pointer access.\n\n[   95.968089] ice 0000:3b:00.1: More TCs defined than queues/rings allocated.\n[   95.968092] ice 0000:3b:00.1: Trying to use more Rx queues (8), than were allocated (1)!\n[   95.968093] ice 0000:3b:00.1: Failed to config TC for VSI index: 0\n[   95.969621] general protection fault: 0000 [#1] SMP NOPTI\n[   95.969705] CPU: 1 PID: 58405 Comm: lldpad Kdump: loaded Tainted: G     U  W  O     --------- -t - 4.18.0 #1\n[   95.969867] Hardware name: O.E.M/BC11SPSCB10, BIOS 8.23 12/30/2021\n[   95.969992] RIP: 0010:devm_kmalloc+0xa/0x60\n[   95.970052] Code: 5c ff ff ff 31 c0 5b 5d 41 5c c3 b8 f4 ff ff ff eb f4 0f 1f 40 00 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 89 d1 \u003c8b\u003e 97 60 02 00 00 48 8d 7e 18 48 39 f7 72 3f 55 89 ce 53 48 8b 4c\n[   95.970344] RSP: 0018:ffffc9003f553888 EFLAGS: 00010206\n[   95.970425] RAX: dead000000000200 RBX: ffffea003c425b00 RCX: 00000000006080c0\n[   95.970536] RDX: 00000000006080c0 RSI: 0000000000000200 RDI: dead000000000200\n[   95.970648] RBP: dead000000000200 R08: 00000000000463c0 R09: ffff888ffa900000\n[   95.970760] R10: 0000000000000000 R11: 0000000000000002 R12: ffff888ff6b40100\n[   95.970870] R13: ffff888ff6a55018 R14: 0000000000000000 R15: ffff888ff6a55460\n[   95.970981] FS:  00007f51b7d24700(0000) GS:ffff88903ee80000(0000) knlGS:0000000000000000\n[   95.971108] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[   95.971197] CR2: 00007fac5410d710 CR3: 0000000f2c1de002 CR4: 00000000007606e0\n[   95.971309] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n[   95.971419] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\n[   95.971530] PKRU: 55555554\n[   95.971573] Call Trace:\n[   95.971622]  ice_setup_rx_ring+0x39/0x110 [ice]\n[   95.971695]  ice_vsi_setup_rx_rings+0x54/0x90 [ice]\n[   95.971774]  ice_vsi_open+0x25/0x120 [ice]\n[   95.971843]  ice_open_internal+0xb8/0x1f0 [ice]\n[   95.971919]  ice_ena_vsi+0x4f/0xd0 [ice]\n[   95.971987]  ice_dcb_ena_dis_vsi.constprop.5+0x29/0x90 [ice]\n[   95.972082]  ice_pf_dcb_cfg+0x29a/0x380 [ice]\n[   95.972154]  ice_dcbnl_setets+0x174/0x1b0 [ice]\n[   95.972220]  dcbnl_ieee_set+0x89/0x230\n[   95.972279]  ? dcbnl_ieee_del+0x150/0x150\n[   95.972341]  dcb_doit+0x124/0x1b0\n[   95.972392]  rtnetlink_rcv_msg+0x243/0x2f0\n[   95.972457]  ? dcb_doit+0x14d/0x1b0\n[   95.972510]  ? __kmalloc_node_track_caller+0x1d3/0x280\n[   95.972591]  ? rtnl_calcit.isra.31+0x100/0x100\n[   95.972661]  netlink_rcv_skb+0xcf/0xf0\n[   95.972720]  netlink_unicast+0x16d/0x220\n[   95.972781]  netlink_sendmsg+0x2ba/0x3a0\n[   95.975891]  sock_sendmsg+0x4c/0x50\n[   95.979032]  ___sys_sendmsg+0x2e4/0x300\n[   95.982147]  ? kmem_cache_alloc+0x13e/0x190\n[   95.985242]  ? __wake_up_common_lock+0x79/0x90\n[   95.988338]  ? __check_object_size+0xac/0x1b0\n[   95.991440]  ? _copy_to_user+0x22/0x30\n[   95.994539]  ? move_addr_to_user+0xbb/0xd0\n[   95.997619]  ? __sys_sendmsg+0x53/0x80\n[   96.000664]  __sys_sendmsg+0x53/0x80\n[   96.003747]  do_syscall_64+0x5b/0x1d0\n[   96.006862]  entry_SYSCALL_64_after_hwframe+0x65/0xca\n\nOnly update num_txq/rxq when passed check, and restore tc_cfg if setup\nqueue map failed.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-48652",
          "url": "https://www.suse.com/security/cve/CVE-2022-48652"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223520 for CVE-2022-48652",
          "url": "https://bugzilla.suse.com/1223520"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:29:53Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-48652"
    },
    {
      "cve": "CVE-2022-48653",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-48653"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nice: Don\u0027t double unplug aux on peer initiated reset\n\nIn the IDC callback that is accessed when the aux drivers request a reset,\nthe function to unplug the aux devices is called.  This function is also\ncalled in the ice_prepare_for_reset function. This double call is causing\na \"scheduling while atomic\" BUG.\n\n[  662.676430] ice 0000:4c:00.0 rocep76s0: cqp opcode = 0x1 maj_err_code = 0xffff min_err_code = 0x8003\n\n[  662.676609] ice 0000:4c:00.0 rocep76s0: [Modify QP Cmd Error][op_code=8] status=-29 waiting=1 completion_err=1 maj=0xffff min=0x8003\n\n[  662.815006] ice 0000:4c:00.0 rocep76s0: ICE OICR event notification: oicr = 0x10000003\n\n[  662.815014] ice 0000:4c:00.0 rocep76s0: critical PE Error, GLPE_CRITERR=0x00011424\n\n[  662.815017] ice 0000:4c:00.0 rocep76s0: Requesting a reset\n\n[  662.815475] BUG: scheduling while atomic: swapper/37/0/0x00010002\n\n[  662.815475] BUG: scheduling while atomic: swapper/37/0/0x00010002\n[  662.815477] Modules linked in: rpcsec_gss_krb5 auth_rpcgss nfsv4 dns_resolver nfs lockd grace fscache netfs rfkill 8021q garp mrp stp llc vfat fat rpcrdma intel_rapl_msr intel_rapl_common sunrpc i10nm_edac rdma_ucm nfit ib_srpt libnvdimm ib_isert iscsi_target_mod x86_pkg_temp_thermal intel_powerclamp coretemp target_core_mod snd_hda_intel ib_iser snd_intel_dspcfg libiscsi snd_intel_sdw_acpi scsi_transport_iscsi kvm_intel iTCO_wdt rdma_cm snd_hda_codec kvm iw_cm ipmi_ssif iTCO_vendor_support snd_hda_core irqbypass crct10dif_pclmul crc32_pclmul ghash_clmulni_intel snd_hwdep snd_seq snd_seq_device rapl snd_pcm snd_timer isst_if_mbox_pci pcspkr isst_if_mmio irdma intel_uncore idxd acpi_ipmi joydev isst_if_common snd mei_me idxd_bus ipmi_si soundcore i2c_i801 mei ipmi_devintf i2c_smbus i2c_ismt ipmi_msghandler acpi_power_meter acpi_pad rv(OE) ib_uverbs ib_cm ib_core xfs libcrc32c ast i2c_algo_bit drm_vram_helper drm_kms_helper syscopyarea sysfillrect sysimgblt fb_sys_fops drm_ttm_helpe\n r ttm\n[  662.815546]  nvme nvme_core ice drm crc32c_intel i40e t10_pi wmi pinctrl_emmitsburg dm_mirror dm_region_hash dm_log dm_mod fuse\n[  662.815557] Preemption disabled at:\n[  662.815558] [\u003c0000000000000000\u003e] 0x0\n[  662.815563] CPU: 37 PID: 0 Comm: swapper/37 Kdump: loaded Tainted: G S         OE     5.17.1 #2\n[  662.815566] Hardware name: Intel Corporation D50DNP/D50DNP, BIOS SE5C6301.86B.6624.D18.2111021741 11/02/2021\n[  662.815568] Call Trace:\n[  662.815572]  \u003cIRQ\u003e\n[  662.815574]  dump_stack_lvl+0x33/0x42\n[  662.815581]  __schedule_bug.cold.147+0x7d/0x8a\n[  662.815588]  __schedule+0x798/0x990\n[  662.815595]  schedule+0x44/0xc0\n[  662.815597]  schedule_preempt_disabled+0x14/0x20\n[  662.815600]  __mutex_lock.isra.11+0x46c/0x490\n[  662.815603]  ? __ibdev_printk+0x76/0xc0 [ib_core]\n[  662.815633]  device_del+0x37/0x3d0\n[  662.815639]  ice_unplug_aux_dev+0x1a/0x40 [ice]\n[  662.815674]  ice_schedule_reset+0x3c/0xd0 [ice]\n[  662.815693]  irdma_iidc_event_handler.cold.7+0xb6/0xd3 [irdma]\n[  662.815712]  ? bitmap_find_next_zero_area_off+0x45/0xa0\n[  662.815719]  ice_send_event_to_aux+0x54/0x70 [ice]\n[  662.815741]  ice_misc_intr+0x21d/0x2d0 [ice]\n[  662.815756]  __handle_irq_event_percpu+0x4c/0x180\n[  662.815762]  handle_irq_event_percpu+0xf/0x40\n[  662.815764]  handle_irq_event+0x34/0x60\n[  662.815766]  handle_edge_irq+0x9a/0x1c0\n[  662.815770]  __common_interrupt+0x62/0x100\n[  662.815774]  common_interrupt+0xb4/0xd0\n[  662.815779]  \u003c/IRQ\u003e\n[  662.815780]  \u003cTASK\u003e\n[  662.815780]  asm_common_interrupt+0x1e/0x40\n[  662.815785] RIP: 0010:cpuidle_enter_state+0xd6/0x380\n[  662.815789] Code: 49 89 c4 0f 1f 44 00 00 31 ff e8 65 d7 95 ff 45 84 ff 74 12 9c 58 f6 c4 02 0f 85 64 02 00 00 31 ff e8 ae c5 9c ff fb 45 85 f6 \u003c0f\u003e 88 12 01 00 00 49 63 d6 4c 2b 24 24 48 8d 04 52 48 8d 04 82 49\n[  662.815791] RSP: 0018:ff2c2c4f18edbe80 EFLAGS: 00000202\n[  662.815793] RAX: ff280805df140000 RBX: 0000000000000002 RCX: 000000000000001f\n[  662.815795] RDX: 0000009a52da2d08 R\n---truncated---",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-48653",
          "url": "https://www.suse.com/security/cve/CVE-2022-48653"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223474 for CVE-2022-48653",
          "url": "https://bugzilla.suse.com/1223474"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:29:53Z",
          "details": "low"
        }
      ],
      "title": "CVE-2022-48653"
    },
    {
      "cve": "CVE-2022-48654",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-48654"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nfnetlink_osf: fix possible bogus match in nf_osf_find()\n\nnf_osf_find() incorrectly returns true on mismatch, this leads to\ncopying uninitialized memory area in nft_osf which can be used to leak\nstale kernel stack data to userspace.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-48654",
          "url": "https://www.suse.com/security/cve/CVE-2022-48654"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223482 for CVE-2022-48654",
          "url": "https://bugzilla.suse.com/1223482"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:29:53Z",
          "details": "low"
        }
      ],
      "title": "CVE-2022-48654"
    },
    {
      "cve": "CVE-2022-48655",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-48655"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfirmware: arm_scmi: Harden accesses to the reset domains\n\nAccessing reset domains descriptors by the index upon the SCMI drivers\nrequests through the SCMI reset operations interface can potentially\nlead to out-of-bound violations if the SCMI driver misbehave.\n\nAdd an internal consistency check before any such domains descriptors\naccesses.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-48655",
          "url": "https://www.suse.com/security/cve/CVE-2022-48655"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223477 for CVE-2022-48655",
          "url": "https://bugzilla.suse.com/1223477"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:29:53Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-48655"
    },
    {
      "cve": "CVE-2022-48656",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-48656"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndmaengine: ti: k3-udma-private: Fix refcount leak bug in of_xudma_dev_get()\n\nWe should call of_node_put() for the reference returned by\nof_parse_phandle() in fail path or when it is not used anymore.\nHere we only need to move the of_node_put() before the check.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-48656",
          "url": "https://www.suse.com/security/cve/CVE-2022-48656"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223479 for CVE-2022-48656",
          "url": "https://bugzilla.suse.com/1223479"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:29:53Z",
          "details": "low"
        }
      ],
      "title": "CVE-2022-48656"
    },
    {
      "cve": "CVE-2022-48657",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-48657"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\narm64: topology: fix possible overflow in amu_fie_setup()\n\ncpufreq_get_hw_max_freq() returns max frequency in kHz as *unsigned int*,\nwhile freq_inv_set_max_ratio() gets passed this frequency in Hz as \u0027u64\u0027.\nMultiplying max frequency by 1000 can potentially result in overflow --\nmultiplying by 1000ULL instead should avoid that...\n\nFound by Linux Verification Center (linuxtesting.org) with the SVACE static\nanalysis tool.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-48657",
          "url": "https://www.suse.com/security/cve/CVE-2022-48657"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223484 for CVE-2022-48657",
          "url": "https://bugzilla.suse.com/1223484"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:29:53Z",
          "details": "low"
        }
      ],
      "title": "CVE-2022-48657"
    },
    {
      "cve": "CVE-2022-48658",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-48658"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm: slub: fix flush_cpu_slab()/__free_slab() invocations in task context.\n\nCommit 5a836bf6b09f (\"mm: slub: move flush_cpu_slab() invocations\n__free_slab() invocations out of IRQ context\") moved all flush_cpu_slab()\ninvocations to the global workqueue to avoid a problem related\nwith deactivate_slab()/__free_slab() being called from an IRQ context\non PREEMPT_RT kernels.\n\nWhen the flush_all_cpu_locked() function is called from a task context\nit may happen that a workqueue with WQ_MEM_RECLAIM bit set ends up\nflushing the global workqueue, this will cause a dependency issue.\n\n workqueue: WQ_MEM_RECLAIM nvme-delete-wq:nvme_delete_ctrl_work [nvme_core]\n   is flushing !WQ_MEM_RECLAIM events:flush_cpu_slab\n WARNING: CPU: 37 PID: 410 at kernel/workqueue.c:2637\n   check_flush_dependency+0x10a/0x120\n Workqueue: nvme-delete-wq nvme_delete_ctrl_work [nvme_core]\n RIP: 0010:check_flush_dependency+0x10a/0x120[  453.262125] Call Trace:\n __flush_work.isra.0+0xbf/0x220\n ? __queue_work+0x1dc/0x420\n flush_all_cpus_locked+0xfb/0x120\n __kmem_cache_shutdown+0x2b/0x320\n kmem_cache_destroy+0x49/0x100\n bioset_exit+0x143/0x190\n blk_release_queue+0xb9/0x100\n kobject_cleanup+0x37/0x130\n nvme_fc_ctrl_free+0xc6/0x150 [nvme_fc]\n nvme_free_ctrl+0x1ac/0x2b0 [nvme_core]\n\nFix this bug by creating a workqueue for the flush operation with\nthe WQ_MEM_RECLAIM bit set.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-48658",
          "url": "https://www.suse.com/security/cve/CVE-2022-48658"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223496 for CVE-2022-48658",
          "url": "https://bugzilla.suse.com/1223496"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:29:53Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-48658"
    },
    {
      "cve": "CVE-2022-48659",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-48659"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm/slub: fix to return errno if kmalloc() fails\n\nIn create_unique_id(), kmalloc(, GFP_KERNEL) can fail due to\nout-of-memory, if it fails, return errno correctly rather than\ntriggering panic via BUG_ON();\n\nkernel BUG at mm/slub.c:5893!\nInternal error: Oops - BUG: 0 [#1] PREEMPT SMP\n\nCall trace:\n sysfs_slab_add+0x258/0x260 mm/slub.c:5973\n __kmem_cache_create+0x60/0x118 mm/slub.c:4899\n create_cache mm/slab_common.c:229 [inline]\n kmem_cache_create_usercopy+0x19c/0x31c mm/slab_common.c:335\n kmem_cache_create+0x1c/0x28 mm/slab_common.c:390\n f2fs_kmem_cache_create fs/f2fs/f2fs.h:2766 [inline]\n f2fs_init_xattr_caches+0x78/0xb4 fs/f2fs/xattr.c:808\n f2fs_fill_super+0x1050/0x1e0c fs/f2fs/super.c:4149\n mount_bdev+0x1b8/0x210 fs/super.c:1400\n f2fs_mount+0x44/0x58 fs/f2fs/super.c:4512\n legacy_get_tree+0x30/0x74 fs/fs_context.c:610\n vfs_get_tree+0x40/0x140 fs/super.c:1530\n do_new_mount+0x1dc/0x4e4 fs/namespace.c:3040\n path_mount+0x358/0x914 fs/namespace.c:3370\n do_mount fs/namespace.c:3383 [inline]\n __do_sys_mount fs/namespace.c:3591 [inline]\n __se_sys_mount fs/namespace.c:3568 [inline]\n __arm64_sys_mount+0x2f8/0x408 fs/namespace.c:3568",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-48659",
          "url": "https://www.suse.com/security/cve/CVE-2022-48659"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223498 for CVE-2022-48659",
          "url": "https://bugzilla.suse.com/1223498"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:29:53Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-48659"
    },
    {
      "cve": "CVE-2022-48660",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-48660"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ngpiolib: cdev: Set lineevent_state::irq after IRQ register successfully\n\nWhen running gpio test on nxp-ls1028 platform with below command\ngpiomon --num-events=3 --rising-edge gpiochip1 25\nThere will be a warning trace as below:\nCall trace:\nfree_irq+0x204/0x360\nlineevent_free+0x64/0x70\ngpio_ioctl+0x598/0x6a0\n__arm64_sys_ioctl+0xb4/0x100\ninvoke_syscall+0x5c/0x130\n......\nel0t_64_sync+0x1a0/0x1a4\nThe reason of this issue is that calling request_threaded_irq()\nfunction failed, and then lineevent_free() is invoked to release\nthe resource. Since the lineevent_state::irq was already set, so\nthe subsequent invocation of free_irq() would trigger the above\nwarning call trace. To fix this issue, set the lineevent_state::irq\nafter the IRQ register successfully.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-48660",
          "url": "https://www.suse.com/security/cve/CVE-2022-48660"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223487 for CVE-2022-48660",
          "url": "https://bugzilla.suse.com/1223487"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:29:53Z",
          "details": "low"
        }
      ],
      "title": "CVE-2022-48660"
    },
    {
      "cve": "CVE-2022-48662",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-48662"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/i915/gem: Really move i915_gem_context.link under ref protection\n\ni915_perf assumes that it can use the i915_gem_context reference to\nprotect its i915-\u003egem.contexts.list iteration. However, this requires\nthat we do not remove the context from the list until after we drop the\nfinal reference and release the struct. If, as currently, we remove the\ncontext from the list during context_close(), the link.next pointer may\nbe poisoned while we are holding the context reference and cause a GPF:\n\n[ 4070.573157] i915 0000:00:02.0: [drm:i915_perf_open_ioctl [i915]] filtering on ctx_id=0x1fffff ctx_id_mask=0x1fffff\n[ 4070.574881] general protection fault, probably for non-canonical address 0xdead000000000100: 0000 [#1] PREEMPT SMP\n[ 4070.574897] CPU: 1 PID: 284392 Comm: amd_performance Tainted: G            E     5.17.9 #180\n[ 4070.574903] Hardware name: Intel Corporation NUC7i5BNK/NUC7i5BNB, BIOS BNKBL357.86A.0052.2017.0918.1346 09/18/2017\n[ 4070.574907] RIP: 0010:oa_configure_all_contexts.isra.0+0x222/0x350 [i915]\n[ 4070.574982] Code: 08 e8 32 6e 10 e1 4d 8b 6d 50 b8 ff ff ff ff 49 83 ed 50 f0 41 0f c1 04 24 83 f8 01 0f 84 e3 00 00 00 85 c0 0f 8e fa 00 00 00 \u003c49\u003e 8b 45 50 48 8d 70 b0 49 8d 45 50 48 39 44 24 10 0f 85 34 fe ff\n[ 4070.574990] RSP: 0018:ffffc90002077b78 EFLAGS: 00010202\n[ 4070.574995] RAX: 0000000000000002 RBX: 0000000000000002 RCX: 0000000000000000\n[ 4070.575000] RDX: 0000000000000001 RSI: ffffc90002077b20 RDI: ffff88810ddc7c68\n[ 4070.575004] RBP: 0000000000000001 R08: ffff888103242648 R09: fffffffffffffffc\n[ 4070.575008] R10: ffffffff82c50bc0 R11: 0000000000025c80 R12: ffff888101bf1860\n[ 4070.575012] R13: dead0000000000b0 R14: ffffc90002077c04 R15: ffff88810be5cabc\n[ 4070.575016] FS:  00007f1ed50c0780(0000) GS:ffff88885ec80000(0000) knlGS:0000000000000000\n[ 4070.575021] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[ 4070.575025] CR2: 00007f1ed5590280 CR3: 000000010ef6f005 CR4: 00000000003706e0\n[ 4070.575029] Call Trace:\n[ 4070.575033]  \u003cTASK\u003e\n[ 4070.575037]  lrc_configure_all_contexts+0x13e/0x150 [i915]\n[ 4070.575103]  gen8_enable_metric_set+0x4d/0x90 [i915]\n[ 4070.575164]  i915_perf_open_ioctl+0xbc0/0x1500 [i915]\n[ 4070.575224]  ? asm_common_interrupt+0x1e/0x40\n[ 4070.575232]  ? i915_oa_init_reg_state+0x110/0x110 [i915]\n[ 4070.575290]  drm_ioctl_kernel+0x85/0x110\n[ 4070.575296]  ? update_load_avg+0x5f/0x5e0\n[ 4070.575302]  drm_ioctl+0x1d3/0x370\n[ 4070.575307]  ? i915_oa_init_reg_state+0x110/0x110 [i915]\n[ 4070.575382]  ? gen8_gt_irq_handler+0x46/0x130 [i915]\n[ 4070.575445]  __x64_sys_ioctl+0x3c4/0x8d0\n[ 4070.575451]  ? __do_softirq+0xaa/0x1d2\n[ 4070.575456]  do_syscall_64+0x35/0x80\n[ 4070.575461]  entry_SYSCALL_64_after_hwframe+0x44/0xae\n[ 4070.575467] RIP: 0033:0x7f1ed5c10397\n[ 4070.575471] Code: 3c 1c e8 1c ff ff ff 85 c0 79 87 49 c7 c4 ff ff ff ff 5b 5d 4c 89 e0 41 5c c3 66 0f 1f 84 00 00 00 00 00 b8 10 00 00 00 0f 05 \u003c48\u003e 3d 01 f0 ff ff 73 01 c3 48 8b 0d a9 da 0d 00 f7 d8 64 89 01 48\n[ 4070.575478] RSP: 002b:00007ffd65c8d7a8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010\n[ 4070.575484] RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 00007f1ed5c10397\n[ 4070.575488] RDX: 00007ffd65c8d7c0 RSI: 0000000040106476 RDI: 0000000000000006\n[ 4070.575492] RBP: 00005620972f9c60 R08: 000000000000000a R09: 0000000000000005\n[ 4070.575496] R10: 000000000000000d R11: 0000000000000246 R12: 000000000000000a\n[ 4070.575500] R13: 000000000000000d R14: 0000000000000000 R15: 00007ffd65c8d7c0\n[ 4070.575505]  \u003c/TASK\u003e\n[ 4070.575507] Modules linked in: nls_ascii(E) nls_cp437(E) vfat(E) fat(E) i915(E) x86_pkg_temp_thermal(E) intel_powerclamp(E) crct10dif_pclmul(E) crc32_pclmul(E) crc32c_intel(E) aesni_intel(E) crypto_simd(E) intel_gtt(E) cryptd(E) ttm(E) rapl(E) intel_cstate(E) drm_kms_helper(E) cfbfillrect(E) syscopyarea(E) cfbimgblt(E) intel_uncore(E) sysfillrect(E) mei_me(E) sysimgblt(E) i2c_i801(E) fb_sys_fops(E) mei(E) intel_pch_thermal(E) i2c_smbus\n---truncated---",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-48662",
          "url": "https://www.suse.com/security/cve/CVE-2022-48662"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223505 for CVE-2022-48662",
          "url": "https://bugzilla.suse.com/1223505"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223521 for CVE-2022-48662",
          "url": "https://bugzilla.suse.com/1223521"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:29:53Z",
          "details": "important"
        }
      ],
      "title": "CVE-2022-48662"
    },
    {
      "cve": "CVE-2022-48663",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-48663"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ngpio: mockup: fix NULL pointer dereference when removing debugfs\n\nWe now remove the device\u0027s debugfs entries when unbinding the driver.\nThis now causes a NULL-pointer dereference on module exit because the\nplatform devices are unregistered *after* the global debugfs directory\nhas been recursively removed. Fix it by unregistering the devices first.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-48663",
          "url": "https://www.suse.com/security/cve/CVE-2022-48663"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223523 for CVE-2022-48663",
          "url": "https://bugzilla.suse.com/1223523"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:29:53Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-48663"
    },
    {
      "cve": "CVE-2022-48667",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-48667"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmb3: fix temporary data corruption in insert range\n\ninsert range doesn\u0027t discard the affected cached region\nso can risk temporarily corrupting file data.\n\nAlso includes some minor cleanup (avoiding rereading\ninode size repeatedly unnecessarily) to make it clearer.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-48667",
          "url": "https://www.suse.com/security/cve/CVE-2022-48667"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223518 for CVE-2022-48667",
          "url": "https://bugzilla.suse.com/1223518"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:29:53Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-48667"
    },
    {
      "cve": "CVE-2022-48668",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-48668"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmb3: fix temporary data corruption in collapse range\n\ncollapse range doesn\u0027t discard the affected cached region\nso can risk temporarily corrupting the file data. This\nfixes xfstest generic/031\n\nI also decided to merge a minor cleanup to this into the same patch\n(avoiding rereading inode size repeatedly unnecessarily) to make it\nclearer.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-48668",
          "url": "https://www.suse.com/security/cve/CVE-2022-48668"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223516 for CVE-2022-48668",
          "url": "https://bugzilla.suse.com/1223516"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:29:53Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-48668"
    },
    {
      "cve": "CVE-2022-48671",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-48671"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncgroup: Add missing cpus_read_lock() to cgroup_attach_task_all()\n\nsyzbot is hitting percpu_rwsem_assert_held(\u0026cpu_hotplug_lock) warning at\ncpuset_attach() [1], for commit 4f7e7236435ca0ab (\"cgroup: Fix\nthreadgroup_rwsem \u003c-\u003e cpus_read_lock() deadlock\") missed that\ncpuset_attach() is also called from cgroup_attach_task_all().\nAdd cpus_read_lock() like what cgroup_procs_write_start() does.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-48671",
          "url": "https://www.suse.com/security/cve/CVE-2022-48671"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223929 for CVE-2022-48671",
          "url": "https://bugzilla.suse.com/1223929"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:29:53Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-48671"
    },
    {
      "cve": "CVE-2022-48672",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-48672"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nof: fdt: fix off-by-one error in unflatten_dt_nodes()\n\nCommit 78c44d910d3e (\"drivers/of: Fix depth when unflattening devicetree\")\nforgot to fix up the depth check in the loop body in unflatten_dt_nodes()\nwhich makes it possible to overflow the nps[] buffer...\n\nFound by Linux Verification Center (linuxtesting.org) with the SVACE static\nanalysis tool.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-48672",
          "url": "https://www.suse.com/security/cve/CVE-2022-48672"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223931 for CVE-2022-48672",
          "url": "https://bugzilla.suse.com/1223931"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:29:53Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-48672"
    },
    {
      "cve": "CVE-2022-48673",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-48673"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/smc: Fix possible access to freed memory in link clear\n\nAfter modifying the QP to the Error state, all RX WR would be completed\nwith WC in IB_WC_WR_FLUSH_ERR status. Current implementation does not\nwait for it is done, but destroy the QP and free the link group directly.\nSo there is a risk that accessing the freed memory in tasklet context.\n\nHere is a crash example:\n\n BUG: unable to handle page fault for address: ffffffff8f220860\n #PF: supervisor write access in kernel mode\n #PF: error_code(0x0002) - not-present page\n PGD f7300e067 P4D f7300e067 PUD f7300f063 PMD 8c4e45063 PTE 800ffff08c9df060\n Oops: 0002 [#1] SMP PTI\n CPU: 1 PID: 0 Comm: swapper/1 Kdump: loaded Tainted: G S         OE     5.10.0-0607+ #23\n Hardware name: Inspur NF5280M4/YZMB-00689-101, BIOS 4.1.20 07/09/2018\n RIP: 0010:native_queued_spin_lock_slowpath+0x176/0x1b0\n Code: f3 90 48 8b 32 48 85 f6 74 f6 eb d5 c1 ee 12 83 e0 03 83 ee 01 48 c1 e0 05 48 63 f6 48 05 00 c8 02 00 48 03 04 f5 00 09 98 8e \u003c48\u003e 89 10 8b 42 08 85 c0 75 09 f3 90 8b 42 08 85 c0 74 f7 48 8b 32\n RSP: 0018:ffffb3b6c001ebd8 EFLAGS: 00010086\n RAX: ffffffff8f220860 RBX: 0000000000000246 RCX: 0000000000080000\n RDX: ffff91db1f86c800 RSI: 000000000000173c RDI: ffff91db62bace00\n RBP: ffff91db62bacc00 R08: 0000000000000000 R09: c00000010000028b\n R10: 0000000000055198 R11: ffffb3b6c001ea58 R12: ffff91db80e05010\n R13: 000000000000000a R14: 0000000000000006 R15: 0000000000000040\n FS:  0000000000000000(0000) GS:ffff91db1f840000(0000) knlGS:0000000000000000\n CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n CR2: ffffffff8f220860 CR3: 00000001f9580004 CR4: 00000000003706e0\n DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\n Call Trace:\n  \u003cIRQ\u003e\n  _raw_spin_lock_irqsave+0x30/0x40\n  mlx5_ib_poll_cq+0x4c/0xc50 [mlx5_ib]\n  smc_wr_rx_tasklet_fn+0x56/0xa0 [smc]\n  tasklet_action_common.isra.21+0x66/0x100\n  __do_softirq+0xd5/0x29c\n  asm_call_irq_on_stack+0x12/0x20\n  \u003c/IRQ\u003e\n  do_softirq_own_stack+0x37/0x40\n  irq_exit_rcu+0x9d/0xa0\n  sysvec_call_function_single+0x34/0x80\n  asm_sysvec_call_function_single+0x12/0x20",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-48673",
          "url": "https://www.suse.com/security/cve/CVE-2022-48673"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223934 for CVE-2022-48673",
          "url": "https://bugzilla.suse.com/1223934"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223940 for CVE-2022-48673",
          "url": "https://bugzilla.suse.com/1223940"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:29:53Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-48673"
    },
    {
      "cve": "CVE-2022-48675",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-48675"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nIB/core: Fix a nested dead lock as part of ODP flow\n\nFix a nested dead lock as part of ODP flow by using mmput_async().\n\nFrom the below call trace [1] can see that calling mmput() once we have\nthe umem_odp-\u003eumem_mutex locked as required by\nib_umem_odp_map_dma_and_lock() might trigger in the same task the\nexit_mmap()-\u003e__mmu_notifier_release()-\u003emlx5_ib_invalidate_range() which\nmay dead lock when trying to lock the same mutex.\n\nMoving to use mmput_async() will solve the problem as the above\nexit_mmap() flow will be called in other task and will be executed once\nthe lock will be available.\n\n[1]\n[64843.077665] task:kworker/u133:2  state:D stack:    0 pid:80906 ppid:\n2 flags:0x00004000\n[64843.077672] Workqueue: mlx5_ib_page_fault mlx5_ib_eqe_pf_action [mlx5_ib]\n[64843.077719] Call Trace:\n[64843.077722]  \u003cTASK\u003e\n[64843.077724]  __schedule+0x23d/0x590\n[64843.077729]  schedule+0x4e/0xb0\n[64843.077735]  schedule_preempt_disabled+0xe/0x10\n[64843.077740]  __mutex_lock.constprop.0+0x263/0x490\n[64843.077747]  __mutex_lock_slowpath+0x13/0x20\n[64843.077752]  mutex_lock+0x34/0x40\n[64843.077758]  mlx5_ib_invalidate_range+0x48/0x270 [mlx5_ib]\n[64843.077808]  __mmu_notifier_release+0x1a4/0x200\n[64843.077816]  exit_mmap+0x1bc/0x200\n[64843.077822]  ? walk_page_range+0x9c/0x120\n[64843.077828]  ? __cond_resched+0x1a/0x50\n[64843.077833]  ? mutex_lock+0x13/0x40\n[64843.077839]  ? uprobe_clear_state+0xac/0x120\n[64843.077860]  mmput+0x5f/0x140\n[64843.077867]  ib_umem_odp_map_dma_and_lock+0x21b/0x580 [ib_core]\n[64843.077931]  pagefault_real_mr+0x9a/0x140 [mlx5_ib]\n[64843.077962]  pagefault_mr+0xb4/0x550 [mlx5_ib]\n[64843.077992]  pagefault_single_data_segment.constprop.0+0x2ac/0x560\n[mlx5_ib]\n[64843.078022]  mlx5_ib_eqe_pf_action+0x528/0x780 [mlx5_ib]\n[64843.078051]  process_one_work+0x22b/0x3d0\n[64843.078059]  worker_thread+0x53/0x410\n[64843.078065]  ? process_one_work+0x3d0/0x3d0\n[64843.078073]  kthread+0x12a/0x150\n[64843.078079]  ? set_kthread_struct+0x50/0x50\n[64843.078085]  ret_from_fork+0x22/0x30\n[64843.078093]  \u003c/TASK\u003e",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-48675",
          "url": "https://www.suse.com/security/cve/CVE-2022-48675"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223894 for CVE-2022-48675",
          "url": "https://bugzilla.suse.com/1223894"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:29:53Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-48675"
    },
    {
      "cve": "CVE-2022-48686",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-48686"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnvme-tcp: fix UAF when detecting digest errors\n\nWe should also bail from the io_work loop when we set rd_enabled to true,\nso we don\u0027t attempt to read data from the socket when the TCP stream is\nalready out-of-sync or corrupted.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-48686",
          "url": "https://www.suse.com/security/cve/CVE-2022-48686"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223948 for CVE-2022-48686",
          "url": "https://bugzilla.suse.com/1223948"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1226337 for CVE-2022-48686",
          "url": "https://bugzilla.suse.com/1226337"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:29:53Z",
          "details": "important"
        }
      ],
      "title": "CVE-2022-48686"
    },
    {
      "cve": "CVE-2022-48687",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-48687"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipv6: sr: fix out-of-bounds read when setting HMAC data.\n\nThe SRv6 layer allows defining HMAC data that can later be used to sign IPv6\nSegment Routing Headers. This configuration is realised via netlink through\nfour attributes: SEG6_ATTR_HMACKEYID, SEG6_ATTR_SECRET, SEG6_ATTR_SECRETLEN and\nSEG6_ATTR_ALGID. Because the SECRETLEN attribute is decoupled from the actual\nlength of the SECRET attribute, it is possible to provide invalid combinations\n(e.g., secret = \"\", secretlen = 64). This case is not checked in the code and\nwith an appropriately crafted netlink message, an out-of-bounds read of up\nto 64 bytes (max secret length) can occur past the skb end pointer and into\nskb_shared_info:\n\nBreakpoint 1, seg6_genl_sethmac (skb=\u003coptimized out\u003e, info=\u003coptimized out\u003e) at net/ipv6/seg6.c:208\n208\t\tmemcpy(hinfo-\u003esecret, secret, slen);\n(gdb) bt\n #0  seg6_genl_sethmac (skb=\u003coptimized out\u003e, info=\u003coptimized out\u003e) at net/ipv6/seg6.c:208\n #1  0xffffffff81e012e9 in genl_family_rcv_msg_doit (skb=skb@entry=0xffff88800b1f9f00, nlh=nlh@entry=0xffff88800b1b7600,\n    extack=extack@entry=0xffffc90000ba7af0, ops=ops@entry=0xffffc90000ba7a80, hdrlen=4, net=0xffffffff84237580 \u003cinit_net\u003e, family=\u003coptimized out\u003e,\n    family=\u003coptimized out\u003e) at net/netlink/genetlink.c:731\n #2  0xffffffff81e01435 in genl_family_rcv_msg (extack=0xffffc90000ba7af0, nlh=0xffff88800b1b7600, skb=0xffff88800b1f9f00,\n    family=0xffffffff82fef6c0 \u003cseg6_genl_family\u003e) at net/netlink/genetlink.c:775\n #3  genl_rcv_msg (skb=0xffff88800b1f9f00, nlh=0xffff88800b1b7600, extack=0xffffc90000ba7af0) at net/netlink/genetlink.c:792\n #4  0xffffffff81dfffc3 in netlink_rcv_skb (skb=skb@entry=0xffff88800b1f9f00, cb=cb@entry=0xffffffff81e01350 \u003cgenl_rcv_msg\u003e)\n    at net/netlink/af_netlink.c:2501\n #5  0xffffffff81e00919 in genl_rcv (skb=0xffff88800b1f9f00) at net/netlink/genetlink.c:803\n #6  0xffffffff81dff6ae in netlink_unicast_kernel (ssk=0xffff888010eec800, skb=0xffff88800b1f9f00, sk=0xffff888004aed000)\n    at net/netlink/af_netlink.c:1319\n #7  netlink_unicast (ssk=ssk@entry=0xffff888010eec800, skb=skb@entry=0xffff88800b1f9f00, portid=portid@entry=0, nonblock=\u003coptimized out\u003e)\n    at net/netlink/af_netlink.c:1345\n #8  0xffffffff81dff9a4 in netlink_sendmsg (sock=\u003coptimized out\u003e, msg=0xffffc90000ba7e48, len=\u003coptimized out\u003e) at net/netlink/af_netlink.c:1921\n...\n(gdb) p/x ((struct sk_buff *)0xffff88800b1f9f00)-\u003ehead + ((struct sk_buff *)0xffff88800b1f9f00)-\u003eend\n$1 = 0xffff88800b1b76c0\n(gdb) p/x secret\n$2 = 0xffff88800b1b76c0\n(gdb) p slen\n$3 = 64 \u0027@\u0027\n\nThe OOB data can then be read back from userspace by dumping HMAC state. This\ncommit fixes this by ensuring SECRETLEN cannot exceed the actual length of\nSECRET.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-48687",
          "url": "https://www.suse.com/security/cve/CVE-2022-48687"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223952 for CVE-2022-48687",
          "url": "https://bugzilla.suse.com/1223952"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1224043 for CVE-2022-48687",
          "url": "https://bugzilla.suse.com/1224043"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:29:53Z",
          "details": "important"
        }
      ],
      "title": "CVE-2022-48687"
    },
    {
      "cve": "CVE-2022-48688",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-48688"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ni40e: Fix kernel crash during module removal\n\nThe driver incorrectly frees client instance and subsequent\ni40e module removal leads to kernel crash.\n\nReproducer:\n1. Do ethtool offline test followed immediately by another one\nhost# ethtool -t eth0 offline; ethtool -t eth0 offline\n2. Remove recursively irdma module that also removes i40e module\nhost# modprobe -r irdma\n\nResult:\n[ 8675.035651] i40e 0000:3d:00.0 eno1: offline testing starting\n[ 8675.193774] i40e 0000:3d:00.0 eno1: testing finished\n[ 8675.201316] i40e 0000:3d:00.0 eno1: offline testing starting\n[ 8675.358921] i40e 0000:3d:00.0 eno1: testing finished\n[ 8675.496921] i40e 0000:3d:00.0: IRDMA hardware initialization FAILED init_state=2 status=-110\n[ 8686.188955] i40e 0000:3d:00.1: i40e_ptp_stop: removed PHC on eno2\n[ 8686.943890] i40e 0000:3d:00.1: Deleted LAN device PF1 bus=0x3d dev=0x00 func=0x01\n[ 8686.952669] i40e 0000:3d:00.0: i40e_ptp_stop: removed PHC on eno1\n[ 8687.761787] BUG: kernel NULL pointer dereference, address: 0000000000000030\n[ 8687.768755] #PF: supervisor read access in kernel mode\n[ 8687.773895] #PF: error_code(0x0000) - not-present page\n[ 8687.779034] PGD 0 P4D 0\n[ 8687.781575] Oops: 0000 [#1] PREEMPT SMP NOPTI\n[ 8687.785935] CPU: 51 PID: 172891 Comm: rmmod Kdump: loaded Tainted: G        W I        5.19.0+ #2\n[ 8687.794800] Hardware name: Intel Corporation S2600WFD/S2600WFD, BIOS SE5C620.86B.0X.02.0001.051420190324 05/14/2019\n[ 8687.805222] RIP: 0010:i40e_lan_del_device+0x13/0xb0 [i40e]\n[ 8687.810719] Code: d4 84 c0 0f 84 b8 25 01 00 e9 9c 25 01 00 41 bc f4 ff ff ff eb 91 90 0f 1f 44 00 00 41 54 55 53 48 8b 87 58 08 00 00 48 89 fb \u003c48\u003e 8b 68 30 48 89 ef e8 21 8a 0f d5 48 89 ef e8 a9 78 0f d5 48 8b\n[ 8687.829462] RSP: 0018:ffffa604072efce0 EFLAGS: 00010202\n[ 8687.834689] RAX: 0000000000000000 RBX: ffff8f43833b2000 RCX: 0000000000000000\n[ 8687.841821] RDX: 0000000000000000 RSI: ffff8f4b0545b298 RDI: ffff8f43833b2000\n[ 8687.848955] RBP: ffff8f43833b2000 R08: 0000000000000001 R09: 0000000000000000\n[ 8687.856086] R10: 0000000000000000 R11: 000ffffffffff000 R12: ffff8f43833b2ef0\n[ 8687.863218] R13: ffff8f43833b2ef0 R14: ffff915103966000 R15: ffff8f43833b2008\n[ 8687.870342] FS:  00007f79501c3740(0000) GS:ffff8f4adffc0000(0000) knlGS:0000000000000000\n[ 8687.878427] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[ 8687.884174] CR2: 0000000000000030 CR3: 000000014276e004 CR4: 00000000007706e0\n[ 8687.891306] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n[ 8687.898441] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\n[ 8687.905572] PKRU: 55555554\n[ 8687.908286] Call Trace:\n[ 8687.910737]  \u003cTASK\u003e\n[ 8687.912843]  i40e_remove+0x2c0/0x330 [i40e]\n[ 8687.917040]  pci_device_remove+0x33/0xa0\n[ 8687.920962]  device_release_driver_internal+0x1aa/0x230\n[ 8687.926188]  driver_detach+0x44/0x90\n[ 8687.929770]  bus_remove_driver+0x55/0xe0\n[ 8687.933693]  pci_unregister_driver+0x2a/0xb0\n[ 8687.937967]  i40e_exit_module+0xc/0xf48 [i40e]\n\nTwo offline tests cause IRDMA driver failure (ETIMEDOUT) and this\nfailure is indicated back to i40e_client_subtask() that calls\ni40e_client_del_instance() to free client instance referenced\nby pf-\u003ecinst and sets this pointer to NULL. During the module\nremoval i40e_remove() calls i40e_lan_del_device() that dereferences\npf-\u003ecinst that is NULL -\u003e crash.\nDo not remove client instance when client open callbacks fails and\njust clear __I40E_CLIENT_INSTANCE_OPENED bit. The driver also needs\nto take care about this situation (when netdev is up and client\nis NOT opened) in i40e_notify_client_of_netdev_close() and\ncalls client close callback only when __I40E_CLIENT_INSTANCE_OPENED\nis set.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-48688",
          "url": "https://www.suse.com/security/cve/CVE-2022-48688"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223953 for CVE-2022-48688",
          "url": "https://bugzilla.suse.com/1223953"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:29:53Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-48688"
    },
    {
      "cve": "CVE-2022-48690",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-48690"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nice: Fix DMA mappings leak\n\nFix leak, when user changes ring parameters.\nDuring reallocation of RX buffers, new DMA mappings are created for\nthose buffers. New buffers with different RX ring count should\nsubstitute older ones, but those buffers were freed in ice_vsi_cfg_rxq\nand reallocated again with ice_alloc_rx_buf. kfree on rx_buf caused\nleak of already mapped DMA.\nReallocate ZC with xdp_buf struct, when BPF program loads. Reallocate\nback to rx_buf, when BPF program unloads.\nIf BPF program is loaded/unloaded and XSK pools are created, reallocate\nRX queues accordingly in XDP_SETUP_XSK_POOL handler.\n\nSteps for reproduction:\nwhile :\ndo\n\tfor ((i=0; i\u003c=8160; i=i+32))\n\tdo\n\t\tethtool -G enp130s0f0 rx $i tx $i\n\t\tsleep 0.5\n\t\tethtool -g enp130s0f0\n\tdone\ndone",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-48690",
          "url": "https://www.suse.com/security/cve/CVE-2022-48690"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223960 for CVE-2022-48690",
          "url": "https://bugzilla.suse.com/1223960"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:29:53Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-48690"
    },
    {
      "cve": "CVE-2022-48692",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-48692"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/srp: Set scmnd-\u003eresult only when scmnd is not NULL\n\nThis change fixes the following kernel NULL pointer dereference\nwhich is reproduced by blktests srp/007 occasionally.\n\nBUG: kernel NULL pointer dereference, address: 0000000000000170\nPGD 0 P4D 0\nOops: 0002 [#1] PREEMPT SMP NOPTI\nCPU: 0 PID: 9 Comm: kworker/0:1H Kdump: loaded Not tainted 6.0.0-rc1+ #37\nHardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.15.0-29-g6a62e0cb0dfe-prebuilt.qemu.org 04/01/2014\nWorkqueue:  0x0 (kblockd)\nRIP: 0010:srp_recv_done+0x176/0x500 [ib_srp]\nCode: 00 4d 85 ff 0f 84 52 02 00 00 48 c7 82 80 02 00 00 00 00 00 00 4c 89 df 4c 89 14 24 e8 53 d3 4a f6 4c 8b 14 24 41 0f b6 42 13 \u003c41\u003e 89 87 70 01 00 00 41 0f b6 52 12 f6 c2 02 74 44 41 8b 42 1c b9\nRSP: 0018:ffffaef7c0003e28 EFLAGS: 00000282\nRAX: 0000000000000000 RBX: ffff9bc9486dea60 RCX: 0000000000000000\nRDX: 0000000000000102 RSI: ffffffffb76bbd0e RDI: 00000000ffffffff\nRBP: ffff9bc980099a00 R08: 0000000000000001 R09: 0000000000000001\nR10: ffff9bca53ef0000 R11: ffff9bc980099a10 R12: ffff9bc956e14000\nR13: ffff9bc9836b9cb0 R14: ffff9bc9557b4480 R15: 0000000000000000\nFS:  0000000000000000(0000) GS:ffff9bc97ec00000(0000) knlGS:0000000000000000\nCS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 0000000000000170 CR3: 0000000007e04000 CR4: 00000000000006f0\nCall Trace:\n \u003cIRQ\u003e\n __ib_process_cq+0xb7/0x280 [ib_core]\n ib_poll_handler+0x2b/0x130 [ib_core]\n irq_poll_softirq+0x93/0x150\n __do_softirq+0xee/0x4b8\n irq_exit_rcu+0xf7/0x130\n sysvec_apic_timer_interrupt+0x8e/0xc0\n \u003c/IRQ\u003e",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-48692",
          "url": "https://www.suse.com/security/cve/CVE-2022-48692"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223962 for CVE-2022-48692",
          "url": "https://bugzilla.suse.com/1223962"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:29:53Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-48692"
    },
    {
      "cve": "CVE-2022-48693",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-48693"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsoc: brcmstb: pm-arm: Fix refcount leak and __iomem leak bugs\n\nIn brcmstb_pm_probe(), there are two kinds of leak bugs:\n\n(1) we need to add of_node_put() when for_each__matching_node() breaks\n(2) we need to add iounmap() for each iomap in fail path",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-48693",
          "url": "https://www.suse.com/security/cve/CVE-2022-48693"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223963 for CVE-2022-48693",
          "url": "https://bugzilla.suse.com/1223963"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:29:53Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-48693"
    },
    {
      "cve": "CVE-2022-48694",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-48694"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/irdma: Fix drain SQ hang with no completion\n\nSW generated completions for outstanding WRs posted on SQ\nafter QP is in error target the wrong CQ. This causes the\nib_drain_sq to hang with no completion.\n\nFix this to generate completions on the right CQ.\n\n[  863.969340] INFO: task kworker/u52:2:671 blocked for more than 122 seconds.\n[  863.979224]       Not tainted 5.14.0-130.el9.x86_64 #1\n[  863.986588] \"echo 0 \u003e /proc/sys/kernel/hung_task_timeout_secs\" disables this message.\n[  863.996997] task:kworker/u52:2   state:D stack:    0 pid:  671 ppid:     2 flags:0x00004000\n[  864.007272] Workqueue: xprtiod xprt_autoclose [sunrpc]\n[  864.014056] Call Trace:\n[  864.017575]  __schedule+0x206/0x580\n[  864.022296]  schedule+0x43/0xa0\n[  864.026736]  schedule_timeout+0x115/0x150\n[  864.032185]  __wait_for_common+0x93/0x1d0\n[  864.037717]  ? usleep_range_state+0x90/0x90\n[  864.043368]  __ib_drain_sq+0xf6/0x170 [ib_core]\n[  864.049371]  ? __rdma_block_iter_next+0x80/0x80 [ib_core]\n[  864.056240]  ib_drain_sq+0x66/0x70 [ib_core]\n[  864.062003]  rpcrdma_xprt_disconnect+0x82/0x3b0 [rpcrdma]\n[  864.069365]  ? xprt_prepare_transmit+0x5d/0xc0 [sunrpc]\n[  864.076386]  xprt_rdma_close+0xe/0x30 [rpcrdma]\n[  864.082593]  xprt_autoclose+0x52/0x100 [sunrpc]\n[  864.088718]  process_one_work+0x1e8/0x3c0\n[  864.094170]  worker_thread+0x50/0x3b0\n[  864.099109]  ? rescuer_thread+0x370/0x370\n[  864.104473]  kthread+0x149/0x170\n[  864.109022]  ? set_kthread_struct+0x40/0x40\n[  864.114713]  ret_from_fork+0x22/0x30",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-48694",
          "url": "https://www.suse.com/security/cve/CVE-2022-48694"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223964 for CVE-2022-48694",
          "url": "https://bugzilla.suse.com/1223964"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:29:53Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-48694"
    },
    {
      "cve": "CVE-2022-48695",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-48695"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: mpt3sas: Fix use-after-free warning\n\nFix the following use-after-free warning which is observed during\ncontroller reset:\n\nrefcount_t: underflow; use-after-free.\nWARNING: CPU: 23 PID: 5399 at lib/refcount.c:28 refcount_warn_saturate+0xa6/0xf0",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-48695",
          "url": "https://www.suse.com/security/cve/CVE-2022-48695"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223941 for CVE-2022-48695",
          "url": "https://bugzilla.suse.com/1223941"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:29:53Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-48695"
    },
    {
      "cve": "CVE-2022-48697",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-48697"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnvmet: fix a use-after-free\n\nFix the following use-after-free complaint triggered by blktests nvme/004:\n\nBUG: KASAN: user-memory-access in blk_mq_complete_request_remote+0xac/0x350\nRead of size 4 at addr 0000607bd1835943 by task kworker/13:1/460\nWorkqueue: nvmet-wq nvme_loop_execute_work [nvme_loop]\nCall Trace:\n show_stack+0x52/0x58\n dump_stack_lvl+0x49/0x5e\n print_report.cold+0x36/0x1e2\n kasan_report+0xb9/0xf0\n __asan_load4+0x6b/0x80\n blk_mq_complete_request_remote+0xac/0x350\n nvme_loop_queue_response+0x1df/0x275 [nvme_loop]\n __nvmet_req_complete+0x132/0x4f0 [nvmet]\n nvmet_req_complete+0x15/0x40 [nvmet]\n nvmet_execute_io_connect+0x18a/0x1f0 [nvmet]\n nvme_loop_execute_work+0x20/0x30 [nvme_loop]\n process_one_work+0x56e/0xa70\n worker_thread+0x2d1/0x640\n kthread+0x183/0x1c0\n ret_from_fork+0x1f/0x30",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-48697",
          "url": "https://www.suse.com/security/cve/CVE-2022-48697"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223922 for CVE-2022-48697",
          "url": "https://bugzilla.suse.com/1223922"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:29:53Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-48697"
    },
    {
      "cve": "CVE-2022-48698",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-48698"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/display: fix memory leak when using debugfs_lookup()\n\nWhen calling debugfs_lookup() the result must have dput() called on it,\notherwise the memory will leak over time.  Fix this up by properly\ncalling dput().",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-48698",
          "url": "https://www.suse.com/security/cve/CVE-2022-48698"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223956 for CVE-2022-48698",
          "url": "https://bugzilla.suse.com/1223956"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:29:53Z",
          "details": "low"
        }
      ],
      "title": "CVE-2022-48698"
    },
    {
      "cve": "CVE-2022-48699",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-48699"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsched/debug: fix dentry leak in update_sched_domain_debugfs\n\nKuyo reports that the pattern of using debugfs_remove(debugfs_lookup())\nleaks a dentry and with a hotplug stress test, the machine eventually\nruns out of memory.\n\nFix this up by using the newly created debugfs_lookup_and_remove() call\ninstead which properly handles the dentry reference counting logic.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-48699",
          "url": "https://www.suse.com/security/cve/CVE-2022-48699"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223996 for CVE-2022-48699",
          "url": "https://bugzilla.suse.com/1223996"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:29:53Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-48699"
    },
    {
      "cve": "CVE-2022-48700",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-48700"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-48700",
          "url": "https://www.suse.com/security/cve/CVE-2022-48700"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223957 for CVE-2022-48700",
          "url": "https://bugzilla.suse.com/1223957"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:29:53Z",
          "details": "low"
        }
      ],
      "title": "CVE-2022-48700"
    },
    {
      "cve": "CVE-2022-48701",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-48701"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: usb-audio: Fix an out-of-bounds bug in __snd_usb_parse_audio_interface()\n\nThere may be a bad USB audio device with a USB ID of (0x04fa, 0x4201) and\nthe number of it\u0027s interfaces less than 4, an out-of-bounds read bug occurs\nwhen parsing the interface descriptor for this device.\n\nFix this by checking the number of interfaces.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-48701",
          "url": "https://www.suse.com/security/cve/CVE-2022-48701"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223921 for CVE-2022-48701",
          "url": "https://bugzilla.suse.com/1223921"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:29:53Z",
          "details": "low"
        }
      ],
      "title": "CVE-2022-48701"
    },
    {
      "cve": "CVE-2022-48702",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-48702"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: emu10k1: Fix out of bounds access in snd_emu10k1_pcm_channel_alloc()\n\nThe voice allocator sometimes begins allocating from near the end of the\narray and then wraps around, however snd_emu10k1_pcm_channel_alloc()\naccesses the newly allocated voices as if it never wrapped around.\n\nThis results in out of bounds access if the first voice has a high enough\nindex so that first_voice + requested_voice_count \u003e NUM_G (64).\nThe more voices are requested, the more likely it is for this to occur.\n\nThis was initially discovered using PipeWire, however it can be reproduced\nby calling aplay multiple times with 16 channels:\naplay -r 48000 -D plughw:CARD=Live,DEV=3 -c 16 /dev/zero\n\nUBSAN: array-index-out-of-bounds in sound/pci/emu10k1/emupcm.c:127:40\nindex 65 is out of range for type \u0027snd_emu10k1_voice [64]\u0027\nCPU: 1 PID: 31977 Comm: aplay Tainted: G        W IOE      6.0.0-rc2-emu10k1+ #7\nHardware name: ASUSTEK COMPUTER INC P5W DH Deluxe/P5W DH Deluxe, BIOS 3002    07/22/2010\nCall Trace:\n\u003cTASK\u003e\ndump_stack_lvl+0x49/0x63\ndump_stack+0x10/0x16\nubsan_epilogue+0x9/0x3f\n__ubsan_handle_out_of_bounds.cold+0x44/0x49\nsnd_emu10k1_playback_hw_params+0x3bc/0x420 [snd_emu10k1]\nsnd_pcm_hw_params+0x29f/0x600 [snd_pcm]\nsnd_pcm_common_ioctl+0x188/0x1410 [snd_pcm]\n? exit_to_user_mode_prepare+0x35/0x170\n? do_syscall_64+0x69/0x90\n? syscall_exit_to_user_mode+0x26/0x50\n? do_syscall_64+0x69/0x90\n? exit_to_user_mode_prepare+0x35/0x170\nsnd_pcm_ioctl+0x27/0x40 [snd_pcm]\n__x64_sys_ioctl+0x95/0xd0\ndo_syscall_64+0x5c/0x90\n? do_syscall_64+0x69/0x90\n? do_syscall_64+0x69/0x90\nentry_SYSCALL_64_after_hwframe+0x63/0xcd",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-48702",
          "url": "https://www.suse.com/security/cve/CVE-2022-48702"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223923 for CVE-2022-48702",
          "url": "https://bugzilla.suse.com/1223923"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:29:53Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-48702"
    },
    {
      "cve": "CVE-2022-48703",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-48703"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nthermal/int340x_thermal: handle data_vault when the value is ZERO_SIZE_PTR\n\nIn some case, the GDDV returns a package with a buffer which has\nzero length. It causes that kmemdup() returns ZERO_SIZE_PTR (0x10).\n\nThen the data_vault_read() got NULL point dereference problem when\naccessing the 0x10 value in data_vault.\n\n[   71.024560] BUG: kernel NULL pointer dereference, address:\n0000000000000010\n\nThis patch uses ZERO_OR_NULL_PTR() for checking ZERO_SIZE_PTR or\nNULL value in data_vault.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-48703",
          "url": "https://www.suse.com/security/cve/CVE-2022-48703"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223924 for CVE-2022-48703",
          "url": "https://bugzilla.suse.com/1223924"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:29:53Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-48703"
    },
    {
      "cve": "CVE-2022-48704",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-48704"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/radeon: add a force flush to delay work when radeon\n\nAlthough radeon card fence and wait for gpu to finish processing current batch rings,\nthere is still a corner case that radeon lockup work queue may not be fully flushed,\nand meanwhile the radeon_suspend_kms() function has called pci_set_power_state() to\nput device in D3hot state.\nPer PCI spec rev 4.0 on 5.3.1.4.1 D3hot State.\n\u003e Configuration and Message requests are the only TLPs accepted by a Function in\n\u003e the D3hot state. All other received Requests must be handled as Unsupported Requests,\n\u003e and all received Completions may optionally be handled as Unexpected Completions.\nThis issue will happen in following logs:\nUnable to handle kernel paging request at virtual address 00008800e0008010\nCPU 0 kworker/0:3(131): Oops 0\npc = [\u003cffffffff811bea5c\u003e]  ra = [\u003cffffffff81240844\u003e]  ps = 0000 Tainted: G        W\npc is at si_gpu_check_soft_reset+0x3c/0x240\nra is at si_dma_is_lockup+0x34/0xd0\nv0 = 0000000000000000  t0 = fff08800e0008010  t1 = 0000000000010000\nt2 = 0000000000008010  t3 = fff00007e3c00000  t4 = fff00007e3c00258\nt5 = 000000000000ffff  t6 = 0000000000000001  t7 = fff00007ef078000\ns0 = fff00007e3c016e8  s1 = fff00007e3c00000  s2 = fff00007e3c00018\ns3 = fff00007e3c00000  s4 = fff00007fff59d80  s5 = 0000000000000000\ns6 = fff00007ef07bd98\na0 = fff00007e3c00000  a1 = fff00007e3c016e8  a2 = 0000000000000008\na3 = 0000000000000001  a4 = 8f5c28f5c28f5c29  a5 = ffffffff810f4338\nt8 = 0000000000000275  t9 = ffffffff809b66f8  t10 = ff6769c5d964b800\nt11= 000000000000b886  pv = ffffffff811bea20  at = 0000000000000000\ngp = ffffffff81d89690  sp = 00000000aa814126\nDisabling lock debugging due to kernel taint\nTrace:\n[\u003cffffffff81240844\u003e] si_dma_is_lockup+0x34/0xd0\n[\u003cffffffff81119610\u003e] radeon_fence_check_lockup+0xd0/0x290\n[\u003cffffffff80977010\u003e] process_one_work+0x280/0x550\n[\u003cffffffff80977350\u003e] worker_thread+0x70/0x7c0\n[\u003cffffffff80977410\u003e] worker_thread+0x130/0x7c0\n[\u003cffffffff80982040\u003e] kthread+0x200/0x210\n[\u003cffffffff809772e0\u003e] worker_thread+0x0/0x7c0\n[\u003cffffffff80981f8c\u003e] kthread+0x14c/0x210\n[\u003cffffffff80911658\u003e] ret_from_kernel_thread+0x18/0x20\n[\u003cffffffff80981e40\u003e] kthread+0x0/0x210\n Code: ad3e0008  43f0074a  ad7e0018  ad9e0020  8c3001e8  40230101\n \u003c88210000\u003e 4821ed21\nSo force lockup work queue flush to fix this problem.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-48704",
          "url": "https://www.suse.com/security/cve/CVE-2022-48704"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223932 for CVE-2022-48704",
          "url": "https://bugzilla.suse.com/1223932"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:29:53Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-48704"
    },
    {
      "cve": "CVE-2023-2860",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-2860"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An out-of-bounds read vulnerability was found in the SR-IPv6 implementation in the Linux kernel. The flaw exists within the processing of seg6 attributes. The issue results from the improper validation of user-supplied data, which can result in a read past the end of an allocated buffer. This flaw allows a privileged local user to disclose sensitive information on affected installations of the Linux kernel.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-2860",
          "url": "https://www.suse.com/security/cve/CVE-2023-2860"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1211592 for CVE-2023-2860",
          "url": "https://bugzilla.suse.com/1211592"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:29:53Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-2860"
    },
    {
      "cve": "CVE-2023-52585",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-52585"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amdgpu: Fix possible NULL dereference in amdgpu_ras_query_error_status_helper()\n\nReturn invalid error code -EINVAL for invalid block id.\n\nFixes the below:\n\ndrivers/gpu/drm/amd/amdgpu/amdgpu_ras.c:1183 amdgpu_ras_query_error_status_helper() error: we previously assumed \u0027info\u0027 could be null (see line 1176)",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-52585",
          "url": "https://www.suse.com/security/cve/CVE-2023-52585"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1221080 for CVE-2023-52585",
          "url": "https://bugzilla.suse.com/1221080"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:29:53Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-52585"
    },
    {
      "cve": "CVE-2023-52589",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-52589"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: rkisp1: Fix IRQ disable race issue\n\nIn rkisp1_isp_stop() and rkisp1_csi_disable() the driver masks the\ninterrupts and then apparently assumes that the interrupt handler won\u0027t\nbe running, and proceeds in the stop procedure. This is not the case, as\nthe interrupt handler can already be running, which would lead to the\nISP being disabled while the interrupt handler handling a captured\nframe.\n\nThis brings up two issues: 1) the ISP could be powered off while the\ninterrupt handler is still running and accessing registers, leading to\nboard lockup, and 2) the interrupt handler code and the code that\ndisables the streaming might do things that conflict.\n\nIt is not clear to me if 2) causes a real issue, but 1) can be seen with\na suitable delay (or printk in my case) in the interrupt handler,\nleading to board lockup.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-52589",
          "url": "https://www.suse.com/security/cve/CVE-2023-52589"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1221084 for CVE-2023-52589",
          "url": "https://bugzilla.suse.com/1221084"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:29:53Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-52589"
    },
    {
      "cve": "CVE-2023-52590",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-52590"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nocfs2: Avoid touching renamed directory if parent does not change\n\nThe VFS will not be locking moved directory if its parent does not\nchange. Change ocfs2 rename code to avoid touching renamed directory if\nits parent does not change as without locking that can corrupt the\nfilesystem.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-52590",
          "url": "https://www.suse.com/security/cve/CVE-2023-52590"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1221088 for CVE-2023-52590",
          "url": "https://bugzilla.suse.com/1221088"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:29:53Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-52590"
    },
    {
      "cve": "CVE-2023-52591",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-52591"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nreiserfs: Avoid touching renamed directory if parent does not change\n\nThe VFS will not be locking moved directory if its parent does not\nchange. Change reiserfs rename code to avoid touching renamed directory\nif its parent does not change as without locking that can corrupt the\nfilesystem.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-52591",
          "url": "https://www.suse.com/security/cve/CVE-2023-52591"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1221044 for CVE-2023-52591",
          "url": "https://bugzilla.suse.com/1221044"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1221578 for CVE-2023-52591",
          "url": "https://bugzilla.suse.com/1221578"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1221598 for CVE-2023-52591",
          "url": "https://bugzilla.suse.com/1221598"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:29:53Z",
          "details": "important"
        }
      ],
      "title": "CVE-2023-52591"
    },
    {
      "cve": "CVE-2023-52593",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-52593"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: wfx: fix possible NULL pointer dereference in wfx_set_mfp_ap()\n\nSince \u0027ieee80211_beacon_get()\u0027 can return NULL, \u0027wfx_set_mfp_ap()\u0027\nshould check the return value before examining skb data. So convert\nthe latter to return an appropriate error code and propagate it to\nreturn from \u0027wfx_start_ap()\u0027 as well. Compile tested only.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-52593",
          "url": "https://www.suse.com/security/cve/CVE-2023-52593"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1221042 for CVE-2023-52593",
          "url": "https://bugzilla.suse.com/1221042"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:29:53Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-52593"
    },
    {
      "cve": "CVE-2023-52614",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-52614"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nPM / devfreq: Fix buffer overflow in trans_stat_show\n\nFix buffer overflow in trans_stat_show().\n\nConvert simple snprintf to the more secure scnprintf with size of\nPAGE_SIZE.\n\nAdd condition checking if we are exceeding PAGE_SIZE and exit early from\nloop. Also add at the end a warning that we exceeded PAGE_SIZE and that\nstats is disabled.\n\nReturn -EFBIG in the case where we don\u0027t have enough space to write the\nfull transition table.\n\nAlso document in the ABI that this function can return -EFBIG error.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-52614",
          "url": "https://www.suse.com/security/cve/CVE-2023-52614"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1221617 for CVE-2023-52614",
          "url": "https://bugzilla.suse.com/1221617"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:29:53Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-52614"
    },
    {
      "cve": "CVE-2023-52616",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-52616"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: lib/mpi - Fix unexpected pointer access in mpi_ec_init\n\nWhen the mpi_ec_ctx structure is initialized, some fields are not\ncleared, causing a crash when referencing the field when the\nstructure was released. Initially, this issue was ignored because\nmemory for mpi_ec_ctx is allocated with the __GFP_ZERO flag.\nFor example, this error will be triggered when calculating the\nZa value for SM2 separately.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-52616",
          "url": "https://www.suse.com/security/cve/CVE-2023-52616"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1221612 for CVE-2023-52616",
          "url": "https://bugzilla.suse.com/1221612"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:29:53Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-52616"
    },
    {
      "cve": "CVE-2023-52620",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-52620"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nf_tables: disallow timeout for anonymous sets\n\nNever used from userspace, disallow these parameters.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-52620",
          "url": "https://www.suse.com/security/cve/CVE-2023-52620"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1221825 for CVE-2023-52620",
          "url": "https://bugzilla.suse.com/1221825"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:29:53Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-52620"
    },
    {
      "cve": "CVE-2023-52635",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-52635"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nPM / devfreq: Synchronize devfreq_monitor_[start/stop]\n\nThere is a chance if a frequent switch of the governor\ndone in a loop result in timer list corruption where\ntimer cancel being done from two place one from\ncancel_delayed_work_sync() and followed by expire_timers()\ncan be seen from the traces[1].\n\nwhile true\ndo\n        echo \"simple_ondemand\" \u003e /sys/class/devfreq/1d84000.ufshc/governor\n        echo \"performance\" \u003e /sys/class/devfreq/1d84000.ufshc/governor\ndone\n\nIt looks to be issue with devfreq driver where\ndevice_monitor_[start/stop] need to synchronized so that\ndelayed work should get corrupted while it is either\nbeing queued or running or being cancelled.\n\nLet\u0027s use polling flag and devfreq lock to synchronize the\nqueueing the timer instance twice and work data being\ncorrupted.\n\n[1]\n...\n..\n\u003cidle\u003e-0    [003]   9436.209662:  timer_cancel   timer=0xffffff80444f0428\n\u003cidle\u003e-0    [003]   9436.209664:  timer_expire_entry   timer=0xffffff80444f0428  now=0x10022da1c  function=__typeid__ZTSFvP10timer_listE_global_addr  baseclk=0x10022da1c\n\u003cidle\u003e-0    [003]   9436.209718:  timer_expire_exit   timer=0xffffff80444f0428\nkworker/u16:6-14217    [003]   9436.209863:  timer_start   timer=0xffffff80444f0428  function=__typeid__ZTSFvP10timer_listE_global_addr  expires=0x10022da2b  now=0x10022da1c  flags=182452227\nvendor.xxxyyy.ha-1593    [004]   9436.209888:  timer_cancel   timer=0xffffff80444f0428\nvendor.xxxyyy.ha-1593    [004]   9436.216390:  timer_init   timer=0xffffff80444f0428\nvendor.xxxyyy.ha-1593    [004]   9436.216392:  timer_start   timer=0xffffff80444f0428  function=__typeid__ZTSFvP10timer_listE_global_addr  expires=0x10022da2c  now=0x10022da1d  flags=186646532\nvendor.xxxyyy.ha-1593    [005]   9436.220992:  timer_cancel   timer=0xffffff80444f0428\nxxxyyyTraceManag-7795    [004]   9436.261641:  timer_cancel   timer=0xffffff80444f0428\n\n[2]\n\n 9436.261653][    C4] Unable to handle kernel paging request at virtual address dead00000000012a\n[ 9436.261664][    C4] Mem abort info:\n[ 9436.261666][    C4]   ESR = 0x96000044\n[ 9436.261669][    C4]   EC = 0x25: DABT (current EL), IL = 32 bits\n[ 9436.261671][    C4]   SET = 0, FnV = 0\n[ 9436.261673][    C4]   EA = 0, S1PTW = 0\n[ 9436.261675][    C4] Data abort info:\n[ 9436.261677][    C4]   ISV = 0, ISS = 0x00000044\n[ 9436.261680][    C4]   CM = 0, WnR = 1\n[ 9436.261682][    C4] [dead00000000012a] address between user and kernel address ranges\n[ 9436.261685][    C4] Internal error: Oops: 96000044 [#1] PREEMPT SMP\n[ 9436.261701][    C4] Skip md ftrace buffer dump for: 0x3a982d0\n...\n\n[ 9436.262138][    C4] CPU: 4 PID: 7795 Comm: TraceManag Tainted: G S      W  O      5.10.149-android12-9-o-g17f915d29d0c #1\n[ 9436.262141][    C4] Hardware name: Qualcomm Technologies, Inc.  (DT)\n[ 9436.262144][    C4] pstate: 22400085 (nzCv daIf +PAN -UAO +TCO BTYPE=--)\n[ 9436.262161][    C4] pc : expire_timers+0x9c/0x438\n[ 9436.262164][    C4] lr : expire_timers+0x2a4/0x438\n[ 9436.262168][    C4] sp : ffffffc010023dd0\n[ 9436.262171][    C4] x29: ffffffc010023df0 x28: ffffffd0636fdc18\n[ 9436.262178][    C4] x27: ffffffd063569dd0 x26: ffffffd063536008\n[ 9436.262182][    C4] x25: 0000000000000001 x24: ffffff88f7c69280\n[ 9436.262185][    C4] x23: 00000000000000e0 x22: dead000000000122\n[ 9436.262188][    C4] x21: 000000010022da29 x20: ffffff8af72b4e80\n[ 9436.262191][    C4] x19: ffffffc010023e50 x18: ffffffc010025038\n[ 9436.262195][    C4] x17: 0000000000000240 x16: 0000000000000201\n[ 9436.262199][    C4] x15: ffffffffffffffff x14: ffffff889f3c3100\n[ 9436.262203][    C4] x13: ffffff889f3c3100 x12: 00000000049f56b8\n[ 9436.262207][    C4] x11: 00000000049f56b8 x10: 00000000ffffffff\n[ 9436.262212][    C4] x9 : ffffffc010023e50 x8 : dead000000000122\n[ 9436.262216][    C4] x7 : ffffffffffffffff x6 : ffffffc0100239d8\n[ 9436.262220][    C4] x5 : 0000000000000000 x4 : 0000000000000101\n[ 9436.262223][    C4] x3 : 0000000000000080 x2 : ffffff8\n---truncated---",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-52635",
          "url": "https://www.suse.com/security/cve/CVE-2023-52635"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222294 for CVE-2023-52635",
          "url": "https://bugzilla.suse.com/1222294"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:29:53Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-52635"
    },
    {
      "cve": "CVE-2023-52645",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-52645"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\npmdomain: mediatek: fix race conditions with genpd\n\nIf the power domains are registered first with genpd and *after that*\nthe driver attempts to power them on in the probe sequence, then it is\npossible that a race condition occurs if genpd tries to power them on\nin the same time.\nThe same is valid for powering them off before unregistering them\nfrom genpd.\nAttempt to fix race conditions by first removing the domains from genpd\nand *after that* powering down domains.\nAlso first power up the domains and *after that* register them\nto genpd.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-52645",
          "url": "https://www.suse.com/security/cve/CVE-2023-52645"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223033 for CVE-2023-52645",
          "url": "https://bugzilla.suse.com/1223033"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:29:53Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-52645"
    },
    {
      "cve": "CVE-2023-52646",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-52646"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\naio: fix mremap after fork null-deref\n\nCommit e4a0d3e720e7 (\"aio: Make it possible to remap aio ring\") introduced\na null-deref if mremap is called on an old aio mapping after fork as\nmm-\u003eioctx_table will be set to NULL.\n\n[jmoyer@redhat.com: fix 80 column issue]",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-52646",
          "url": "https://www.suse.com/security/cve/CVE-2023-52646"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223432 for CVE-2023-52646",
          "url": "https://bugzilla.suse.com/1223432"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:29:53Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-52646"
    },
    {
      "cve": "CVE-2023-52652",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-52652"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nNTB: fix possible name leak in ntb_register_device()\n\nIf device_register() fails in ntb_register_device(), the device name\nallocated by dev_set_name() should be freed. As per the comment in\ndevice_register(), callers should use put_device() to give up the\nreference in the error path. So fix this by calling put_device() in the\nerror path so that the name can be freed in kobject_cleanup().\n\nAs a result of this, put_device() in the error path of\nntb_register_device() is removed and the actual error is returned.\n\n[mani: reworded commit message]",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-52652",
          "url": "https://www.suse.com/security/cve/CVE-2023-52652"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223686 for CVE-2023-52652",
          "url": "https://bugzilla.suse.com/1223686"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:29:53Z",
          "details": "low"
        }
      ],
      "title": "CVE-2023-52652"
    },
    {
      "cve": "CVE-2023-6270",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-6270"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A flaw was found in the ATA over Ethernet (AoE) driver in the Linux kernel. The aoecmd_cfg_pkts() function improperly updates the refcnt on `struct net_device`, and a use-after-free can be triggered by racing between the free on the struct and the access through the `skbtxq` global queue. This could lead to a denial of service condition or potential code execution.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-6270",
          "url": "https://www.suse.com/security/cve/CVE-2023-6270"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1218562 for CVE-2023-6270",
          "url": "https://bugzilla.suse.com/1218562"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1218813 for CVE-2023-6270",
          "url": "https://bugzilla.suse.com/1218813"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1221578 for CVE-2023-6270",
          "url": "https://bugzilla.suse.com/1221578"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1221598 for CVE-2023-6270",
          "url": "https://bugzilla.suse.com/1221598"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223016 for CVE-2023-6270",
          "url": "https://bugzilla.suse.com/1223016"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1227675 for CVE-2023-6270",
          "url": "https://bugzilla.suse.com/1227675"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:29:53Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-6270"
    },
    {
      "cve": "CVE-2024-0639",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-0639"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A denial of service vulnerability due to a deadlock was found in sctp_auto_asconf_init in net/sctp/socket.c in the Linux kernel\u0027s SCTP subsystem. This flaw allows guests with local user privileges to trigger a deadlock and potentially crash the system.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-0639",
          "url": "https://www.suse.com/security/cve/CVE-2024-0639"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1218917 for CVE-2024-0639",
          "url": "https://bugzilla.suse.com/1218917"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:29:53Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-0639"
    },
    {
      "cve": "CVE-2024-0841",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-0841"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A null pointer dereference flaw was found in the hugetlbfs_fill_super function in the Linux kernel hugetlbfs (HugeTLB pages) functionality. This issue may allow a local user to crash the system or potentially escalate their privileges on the system.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-0841",
          "url": "https://www.suse.com/security/cve/CVE-2024-0841"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1219264 for CVE-2024-0841",
          "url": "https://bugzilla.suse.com/1219264"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:29:53Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-0841"
    },
    {
      "cve": "CVE-2024-2201",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-2201"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A cross-privilege Spectre v2 vulnerability allows attackers to bypass all deployed mitigations, including the recent Fine(IBT), and to leak arbitrary Linux kernel memory on Intel systems.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-2201",
          "url": "https://www.suse.com/security/cve/CVE-2024-2201"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1212111 for CVE-2024-2201",
          "url": "https://bugzilla.suse.com/1212111"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1217339 for CVE-2024-2201",
          "url": "https://bugzilla.suse.com/1217339"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:29:53Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-2201"
    },
    {
      "cve": "CVE-2024-22099",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-22099"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "NULL Pointer Dereference vulnerability in Linux Linux kernel kernel on Linux, x86, ARM (net, bluetooth modules) allows Overflow Buffers. This vulnerability is associated with program files /net/bluetooth/rfcomm/core.C.\n\nThis issue affects Linux kernel: v2.6.12-rc2.\n\n",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-22099",
          "url": "https://www.suse.com/security/cve/CVE-2024-22099"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1219170 for CVE-2024-22099",
          "url": "https://bugzilla.suse.com/1219170"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:29:53Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-22099"
    },
    {
      "cve": "CVE-2024-23307",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-23307"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Integer Overflow or Wraparound vulnerability in Linux Linux kernel kernel on Linux, x86, ARM (md, raid, raid5 modules) allows Forced Integer Overflow.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-23307",
          "url": "https://www.suse.com/security/cve/CVE-2024-23307"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1219169 for CVE-2024-23307",
          "url": "https://bugzilla.suse.com/1219169"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1220145 for CVE-2024-23307",
          "url": "https://bugzilla.suse.com/1220145"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:29:53Z",
          "details": "important"
        }
      ],
      "title": "CVE-2024-23307"
    },
    {
      "cve": "CVE-2024-23848",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-23848"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel through 6.7.1, there is a use-after-free in cec_queue_msg_fh, related to drivers/media/cec/core/cec-adap.c and drivers/media/cec/core/cec-api.c.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-23848",
          "url": "https://www.suse.com/security/cve/CVE-2024-23848"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1219104 for CVE-2024-23848",
          "url": "https://bugzilla.suse.com/1219104"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:29:53Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-23848"
    },
    {
      "cve": "CVE-2024-23850",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-23850"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In btrfs_get_root_ref in fs/btrfs/disk-io.c in the Linux kernel through 6.7.1, there can be an assertion failure and crash because a subvolume can be read out too soon after its root item is inserted upon subvolume creation.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-23850",
          "url": "https://www.suse.com/security/cve/CVE-2024-23850"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1219126 for CVE-2024-23850",
          "url": "https://bugzilla.suse.com/1219126"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:29:53Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-23850"
    },
    {
      "cve": "CVE-2024-26601",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26601"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\next4: regenerate buddy after block freeing failed if under fc replay\n\nThis mostly reverts commit 6bd97bf273bd (\"ext4: remove redundant\nmb_regenerate_buddy()\") and reintroduces mb_regenerate_buddy(). Based on\ncode in mb_free_blocks(), fast commit replay can end up marking as free\nblocks that are already marked as such. This causes corruption of the\nbuddy bitmap so we need to regenerate it in that case.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26601",
          "url": "https://www.suse.com/security/cve/CVE-2024-26601"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1220342 for CVE-2024-26601",
          "url": "https://bugzilla.suse.com/1220342"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:29:53Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26601"
    },
    {
      "cve": "CVE-2024-26610",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26610"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: iwlwifi: fix a memory corruption\n\niwl_fw_ini_trigger_tlv::data is a pointer to a __le32, which means that\nif we copy to iwl_fw_ini_trigger_tlv::data + offset while offset is in\nbytes, we\u0027ll write past the buffer.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26610",
          "url": "https://www.suse.com/security/cve/CVE-2024-26610"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1221299 for CVE-2024-26610",
          "url": "https://bugzilla.suse.com/1221299"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1221302 for CVE-2024-26610",
          "url": "https://bugzilla.suse.com/1221302"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:29:53Z",
          "details": "important"
        }
      ],
      "title": "CVE-2024-26610"
    },
    {
      "cve": "CVE-2024-26656",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26656"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amdgpu: fix use-after-free bug\n\nThe bug can be triggered by sending a single amdgpu_gem_userptr_ioctl\nto the AMDGPU DRM driver on any ASICs with an invalid address and size.\nThe bug was reported by Joonkyo Jung \u003cjoonkyoj@yonsei.ac.kr\u003e.\nFor example the following code:\n\nstatic void Syzkaller1(int fd)\n{\n\tstruct drm_amdgpu_gem_userptr arg;\n\tint ret;\n\n\targ.addr = 0xffffffffffff0000;\n\targ.size = 0x80000000; /*2 Gb*/\n\targ.flags = 0x7;\n\tret = drmIoctl(fd, 0xc1186451/*amdgpu_gem_userptr_ioctl*/, \u0026arg);\n}\n\nDue to the address and size are not valid there is a failure in\namdgpu_hmm_register-\u003emmu_interval_notifier_insert-\u003e__mmu_interval_notifier_insert-\u003e\ncheck_shl_overflow, but we even the amdgpu_hmm_register failure we still call\namdgpu_hmm_unregister into  amdgpu_gem_object_free which causes access to a bad address.\nThe following stack is below when the issue is reproduced when Kazan is enabled:\n\n[  +0.000014] Hardware name: ASUS System Product Name/ROG STRIX B550-F GAMING (WI-FI), BIOS 1401 12/03/2020\n[  +0.000009] RIP: 0010:mmu_interval_notifier_remove+0x327/0x340\n[  +0.000017] Code: ff ff 49 89 44 24 08 48 b8 00 01 00 00 00 00 ad de 4c 89 f7 49 89 47 40 48 83 c0 22 49 89 47 48 e8 ce d1 2d 01 e9 32 ff ff ff \u003c0f\u003e 0b e9 16 ff ff ff 4c 89 ef e8 fa 14 b3 ff e9 36 ff ff ff e8 80\n[  +0.000014] RSP: 0018:ffffc90002657988 EFLAGS: 00010246\n[  +0.000013] RAX: 0000000000000000 RBX: 1ffff920004caf35 RCX: ffffffff8160565b\n[  +0.000011] RDX: dffffc0000000000 RSI: 0000000000000004 RDI: ffff8881a9f78260\n[  +0.000010] RBP: ffffc90002657a70 R08: 0000000000000001 R09: fffff520004caf25\n[  +0.000010] R10: 0000000000000003 R11: ffffffff8161d1d6 R12: ffff88810e988c00\n[  +0.000010] R13: ffff888126fb5a00 R14: ffff88810e988c0c R15: ffff8881a9f78260\n[  +0.000011] FS:  00007ff9ec848540(0000) GS:ffff8883cc880000(0000) knlGS:0000000000000000\n[  +0.000012] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[  +0.000010] CR2: 000055b3f7e14328 CR3: 00000001b5770000 CR4: 0000000000350ef0\n[  +0.000010] Call Trace:\n[  +0.000006]  \u003cTASK\u003e\n[  +0.000007]  ? show_regs+0x6a/0x80\n[  +0.000018]  ? __warn+0xa5/0x1b0\n[  +0.000019]  ? mmu_interval_notifier_remove+0x327/0x340\n[  +0.000018]  ? report_bug+0x24a/0x290\n[  +0.000022]  ? handle_bug+0x46/0x90\n[  +0.000015]  ? exc_invalid_op+0x19/0x50\n[  +0.000016]  ? asm_exc_invalid_op+0x1b/0x20\n[  +0.000017]  ? kasan_save_stack+0x26/0x50\n[  +0.000017]  ? mmu_interval_notifier_remove+0x23b/0x340\n[  +0.000019]  ? mmu_interval_notifier_remove+0x327/0x340\n[  +0.000019]  ? mmu_interval_notifier_remove+0x23b/0x340\n[  +0.000020]  ? __pfx_mmu_interval_notifier_remove+0x10/0x10\n[  +0.000017]  ? kasan_save_alloc_info+0x1e/0x30\n[  +0.000018]  ? srso_return_thunk+0x5/0x5f\n[  +0.000014]  ? __kasan_kmalloc+0xb1/0xc0\n[  +0.000018]  ? srso_return_thunk+0x5/0x5f\n[  +0.000013]  ? __kasan_check_read+0x11/0x20\n[  +0.000020]  amdgpu_hmm_unregister+0x34/0x50 [amdgpu]\n[  +0.004695]  amdgpu_gem_object_free+0x66/0xa0 [amdgpu]\n[  +0.004534]  ? __pfx_amdgpu_gem_object_free+0x10/0x10 [amdgpu]\n[  +0.004291]  ? do_syscall_64+0x5f/0xe0\n[  +0.000023]  ? srso_return_thunk+0x5/0x5f\n[  +0.000017]  drm_gem_object_free+0x3b/0x50 [drm]\n[  +0.000489]  amdgpu_gem_userptr_ioctl+0x306/0x500 [amdgpu]\n[  +0.004295]  ? __pfx_amdgpu_gem_userptr_ioctl+0x10/0x10 [amdgpu]\n[  +0.004270]  ? srso_return_thunk+0x5/0x5f\n[  +0.000014]  ? __this_cpu_preempt_check+0x13/0x20\n[  +0.000015]  ? srso_return_thunk+0x5/0x5f\n[  +0.000013]  ? sysvec_apic_timer_interrupt+0x57/0xc0\n[  +0.000020]  ? srso_return_thunk+0x5/0x5f\n[  +0.000014]  ? asm_sysvec_apic_timer_interrupt+0x1b/0x20\n[  +0.000022]  ? drm_ioctl_kernel+0x17b/0x1f0 [drm]\n[  +0.000496]  ? __pfx_amdgpu_gem_userptr_ioctl+0x10/0x10 [amdgpu]\n[  +0.004272]  ? drm_ioctl_kernel+0x190/0x1f0 [drm]\n[  +0.000492]  drm_ioctl_kernel+0x140/0x1f0 [drm]\n[  +0.000497]  ? __pfx_amdgpu_gem_userptr_ioctl+0x10/0x10 [amdgpu]\n[  +0.004297]  ? __pfx_drm_ioctl_kernel+0x10/0x10 [d\n---truncated---",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26656",
          "url": "https://www.suse.com/security/cve/CVE-2024-26656"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222307 for CVE-2024-26656",
          "url": "https://bugzilla.suse.com/1222307"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:29:53Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26656"
    },
    {
      "cve": "CVE-2024-26671",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26671"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nblk-mq: fix IO hang from sbitmap wakeup race\n\nIn blk_mq_mark_tag_wait(), __add_wait_queue() may be re-ordered\nwith the following blk_mq_get_driver_tag() in case of getting driver\ntag failure.\n\nThen in __sbitmap_queue_wake_up(), waitqueue_active() may not observe\nthe added waiter in blk_mq_mark_tag_wait() and wake up nothing, meantime\nblk_mq_mark_tag_wait() can\u0027t get driver tag successfully.\n\nThis issue can be reproduced by running the following test in loop, and\nfio hang can be observed in \u003c 30min when running it on my test VM\nin laptop.\n\n\tmodprobe -r scsi_debug\n\tmodprobe scsi_debug delay=0 dev_size_mb=4096 max_queue=1 host_max_queue=1 submit_queues=4\n\tdev=`ls -d /sys/bus/pseudo/drivers/scsi_debug/adapter*/host*/target*/*/block/* | head -1 | xargs basename`\n\tfio --filename=/dev/\"$dev\" --direct=1 --rw=randrw --bs=4k --iodepth=1 \\\n       \t\t--runtime=100 --numjobs=40 --time_based --name=test \\\n        \t--ioengine=libaio\n\nFix the issue by adding one explicit barrier in blk_mq_mark_tag_wait(), which\nis just fine in case of running out of tag.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26671",
          "url": "https://www.suse.com/security/cve/CVE-2024-26671"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222357 for CVE-2024-26671",
          "url": "https://bugzilla.suse.com/1222357"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:29:53Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26671"
    },
    {
      "cve": "CVE-2024-26673",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26673"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nft_ct: sanitize layer 3 and 4 protocol number in custom expectations\n\n- Disallow families other than NFPROTO_{IPV4,IPV6,INET}.\n- Disallow layer 4 protocol with no ports, since destination port is a\n  mandatory attribute for this object.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26673",
          "url": "https://www.suse.com/security/cve/CVE-2024-26673"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222368 for CVE-2024-26673",
          "url": "https://bugzilla.suse.com/1222368"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:29:53Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26673"
    },
    {
      "cve": "CVE-2024-26675",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26675"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nppp_async: limit MRU to 64K\n\nsyzbot triggered a warning [1] in __alloc_pages():\n\nWARN_ON_ONCE_GFP(order \u003e MAX_PAGE_ORDER, gfp)\n\nWillem fixed a similar issue in commit c0a2a1b0d631 (\"ppp: limit MRU to 64K\")\n\nAdopt the same sanity check for ppp_async_ioctl(PPPIOCSMRU)\n\n[1]:\n\n WARNING: CPU: 1 PID: 11 at mm/page_alloc.c:4543 __alloc_pages+0x308/0x698 mm/page_alloc.c:4543\nModules linked in:\nCPU: 1 PID: 11 Comm: kworker/u4:0 Not tainted 6.8.0-rc2-syzkaller-g41bccc98fb79 #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023\nWorkqueue: events_unbound flush_to_ldisc\npstate: 204000c5 (nzCv daIF +PAN -UAO -TCO -DIT -SSBS BTYPE=--)\n pc : __alloc_pages+0x308/0x698 mm/page_alloc.c:4543\n lr : __alloc_pages+0xc8/0x698 mm/page_alloc.c:4537\nsp : ffff800093967580\nx29: ffff800093967660 x28: ffff8000939675a0 x27: dfff800000000000\nx26: ffff70001272ceb4 x25: 0000000000000000 x24: ffff8000939675c0\nx23: 0000000000000000 x22: 0000000000060820 x21: 1ffff0001272ceb8\nx20: ffff8000939675e0 x19: 0000000000000010 x18: ffff800093967120\nx17: ffff800083bded5c x16: ffff80008ac97500 x15: 0000000000000005\nx14: 1ffff0001272cebc x13: 0000000000000000 x12: 0000000000000000\nx11: ffff70001272cec1 x10: 1ffff0001272cec0 x9 : 0000000000000001\nx8 : ffff800091c91000 x7 : 0000000000000000 x6 : 000000000000003f\nx5 : 00000000ffffffff x4 : 0000000000000000 x3 : 0000000000000020\nx2 : 0000000000000008 x1 : 0000000000000000 x0 : ffff8000939675e0\nCall trace:\n  __alloc_pages+0x308/0x698 mm/page_alloc.c:4543\n  __alloc_pages_node include/linux/gfp.h:238 [inline]\n  alloc_pages_node include/linux/gfp.h:261 [inline]\n  __kmalloc_large_node+0xbc/0x1fc mm/slub.c:3926\n  __do_kmalloc_node mm/slub.c:3969 [inline]\n  __kmalloc_node_track_caller+0x418/0x620 mm/slub.c:4001\n  kmalloc_reserve+0x17c/0x23c net/core/skbuff.c:590\n  __alloc_skb+0x1c8/0x3d8 net/core/skbuff.c:651\n  __netdev_alloc_skb+0xb8/0x3e8 net/core/skbuff.c:715\n  netdev_alloc_skb include/linux/skbuff.h:3235 [inline]\n  dev_alloc_skb include/linux/skbuff.h:3248 [inline]\n  ppp_async_input drivers/net/ppp/ppp_async.c:863 [inline]\n  ppp_asynctty_receive+0x588/0x186c drivers/net/ppp/ppp_async.c:341\n  tty_ldisc_receive_buf+0x12c/0x15c drivers/tty/tty_buffer.c:390\n  tty_port_default_receive_buf+0x74/0xac drivers/tty/tty_port.c:37\n  receive_buf drivers/tty/tty_buffer.c:444 [inline]\n  flush_to_ldisc+0x284/0x6e4 drivers/tty/tty_buffer.c:494\n  process_one_work+0x694/0x1204 kernel/workqueue.c:2633\n  process_scheduled_works kernel/workqueue.c:2706 [inline]\n  worker_thread+0x938/0xef4 kernel/workqueue.c:2787\n  kthread+0x288/0x310 kernel/kthread.c:388\n  ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:860",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26675",
          "url": "https://www.suse.com/security/cve/CVE-2024-26675"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222379 for CVE-2024-26675",
          "url": "https://bugzilla.suse.com/1222379"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:29:53Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26675"
    },
    {
      "cve": "CVE-2024-26679",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26679"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ninet: read sk-\u003esk_family once in inet_recv_error()\n\ninet_recv_error() is called without holding the socket lock.\n\nIPv6 socket could mutate to IPv4 with IPV6_ADDRFORM\nsocket option and trigger a KCSAN warning.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26679",
          "url": "https://www.suse.com/security/cve/CVE-2024-26679"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222385 for CVE-2024-26679",
          "url": "https://bugzilla.suse.com/1222385"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:29:53Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26679"
    },
    {
      "cve": "CVE-2024-26687",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26687"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nxen/events: close evtchn after mapping cleanup\n\nshutdown_pirq and startup_pirq are not taking the\nirq_mapping_update_lock because they can\u0027t due to lock inversion. Both\nare called with the irq_desc-\u003elock being taking. The lock order,\nhowever, is first irq_mapping_update_lock and then irq_desc-\u003elock.\n\nThis opens multiple races:\n- shutdown_pirq can be interrupted by a function that allocates an event\n  channel:\n\n  CPU0                        CPU1\n  shutdown_pirq {\n    xen_evtchn_close(e)\n                              __startup_pirq {\n                                EVTCHNOP_bind_pirq\n                                  -\u003e returns just freed evtchn e\n                                set_evtchn_to_irq(e, irq)\n                              }\n    xen_irq_info_cleanup() {\n      set_evtchn_to_irq(e, -1)\n    }\n  }\n\n  Assume here event channel e refers here to the same event channel\n  number.\n  After this race the evtchn_to_irq mapping for e is invalid (-1).\n\n- __startup_pirq races with __unbind_from_irq in a similar way. Because\n  __startup_pirq doesn\u0027t take irq_mapping_update_lock it can grab the\n  evtchn that __unbind_from_irq is currently freeing and cleaning up. In\n  this case even though the event channel is allocated, its mapping can\n  be unset in evtchn_to_irq.\n\nThe fix is to first cleanup the mappings and then close the event\nchannel. In this way, when an event channel gets allocated it\u0027s\npotential previous evtchn_to_irq mappings are guaranteed to be unset already.\nThis is also the reverse order of the allocation where first the event\nchannel is allocated and then the mappings are setup.\n\nOn a 5.10 kernel prior to commit 3fcdaf3d7634 (\"xen/events: modify internal\n[un]bind interfaces\"), we hit a BUG like the following during probing of NVMe\ndevices. The issue is that during nvme_setup_io_queues, pci_free_irq\nis called for every device which results in a call to shutdown_pirq.\nWith many nvme devices it\u0027s therefore likely to hit this race during\nboot because there will be multiple calls to shutdown_pirq and\nstartup_pirq are running potentially in parallel.\n\n  ------------[ cut here ]------------\n  blkfront: xvda: barrier or flush: disabled; persistent grants: enabled; indirect descriptors: enabled; bounce buffer: enabled\n  kernel BUG at drivers/xen/events/events_base.c:499!\n  invalid opcode: 0000 [#1] SMP PTI\n  CPU: 44 PID: 375 Comm: kworker/u257:23 Not tainted 5.10.201-191.748.amzn2.x86_64 #1\n  Hardware name: Xen HVM domU, BIOS 4.11.amazon 08/24/2006\n  Workqueue: nvme-reset-wq nvme_reset_work\n  RIP: 0010:bind_evtchn_to_cpu+0xdf/0xf0\n  Code: 5d 41 5e c3 cc cc cc cc 44 89 f7 e8 2b 55 ad ff 49 89 c5 48 85 c0 0f 84 64 ff ff ff 4c 8b 68 30 41 83 fe ff 0f 85 60 ff ff ff \u003c0f\u003e 0b 66 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 0f 1f 44 00 00\n  RSP: 0000:ffffc9000d533b08 EFLAGS: 00010046\n  RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000006\n  RDX: 0000000000000028 RSI: 00000000ffffffff RDI: 00000000ffffffff\n  RBP: ffff888107419680 R08: 0000000000000000 R09: ffffffff82d72b00\n  R10: 0000000000000000 R11: 0000000000000000 R12: 00000000000001ed\n  R13: 0000000000000000 R14: 00000000ffffffff R15: 0000000000000002\n  FS:  0000000000000000(0000) GS:ffff88bc8b500000(0000) knlGS:0000000000000000\n  CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n  CR2: 0000000000000000 CR3: 0000000002610001 CR4: 00000000001706e0\n  DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n  DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\n  Call Trace:\n   ? show_trace_log_lvl+0x1c1/0x2d9\n   ? show_trace_log_lvl+0x1c1/0x2d9\n   ? set_affinity_irq+0xdc/0x1c0\n   ? __die_body.cold+0x8/0xd\n   ? die+0x2b/0x50\n   ? do_trap+0x90/0x110\n   ? bind_evtchn_to_cpu+0xdf/0xf0\n   ? do_error_trap+0x65/0x80\n   ? bind_evtchn_to_cpu+0xdf/0xf0\n   ? exc_invalid_op+0x4e/0x70\n   ? bind_evtchn_to_cpu+0xdf/0xf0\n   ? asm_exc_invalid_op+0x12/0x20\n   ? bind_evtchn_to_cpu+0xdf/0x\n---truncated---",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26687",
          "url": "https://www.suse.com/security/cve/CVE-2024-26687"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222435 for CVE-2024-26687",
          "url": "https://bugzilla.suse.com/1222435"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:29:53Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26687"
    },
    {
      "cve": "CVE-2024-26688",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26688"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfs,hugetlb: fix NULL pointer dereference in hugetlbs_fill_super\n\nWhen configuring a hugetlb filesystem via the fsconfig() syscall, there is\na possible NULL dereference in hugetlbfs_fill_super() caused by assigning\nNULL to ctx-\u003ehstate in hugetlbfs_parse_param() when the requested pagesize\nis non valid.\n\nE.g: Taking the following steps:\n\n     fd = fsopen(\"hugetlbfs\", FSOPEN_CLOEXEC);\n     fsconfig(fd, FSCONFIG_SET_STRING, \"pagesize\", \"1024\", 0);\n     fsconfig(fd, FSCONFIG_CMD_CREATE, NULL, NULL, 0);\n\nGiven that the requested \"pagesize\" is invalid, ctxt-\u003ehstate will be replaced\nwith NULL, losing its previous value, and we will print an error:\n\n ...\n ...\n case Opt_pagesize:\n ps = memparse(param-\u003estring, \u0026rest);\n ctx-\u003ehstate = h;\n if (!ctx-\u003ehstate) {\n         pr_err(\"Unsupported page size %lu MB\\n\", ps / SZ_1M);\n         return -EINVAL;\n }\n return 0;\n ...\n ...\n\nThis is a problem because later on, we will dereference ctxt-\u003ehstate in\nhugetlbfs_fill_super()\n\n ...\n ...\n sb-\u003es_blocksize = huge_page_size(ctx-\u003ehstate);\n ...\n ...\n\nCausing below Oops.\n\nFix this by replacing cxt-\u003ehstate value only when then pagesize is known\nto be valid.\n\n kernel: hugetlbfs: Unsupported page size 0 MB\n kernel: BUG: kernel NULL pointer dereference, address: 0000000000000028\n kernel: #PF: supervisor read access in kernel mode\n kernel: #PF: error_code(0x0000) - not-present page\n kernel: PGD 800000010f66c067 P4D 800000010f66c067 PUD 1b22f8067 PMD 0\n kernel: Oops: 0000 [#1] PREEMPT SMP PTI\n kernel: CPU: 4 PID: 5659 Comm: syscall Tainted: G            E      6.8.0-rc2-default+ #22 5a47c3fef76212addcc6eb71344aabc35190ae8f\n kernel: Hardware name: Intel Corp. GROVEPORT/GROVEPORT, BIOS GVPRCRB1.86B.0016.D04.1705030402 05/03/2017\n kernel: RIP: 0010:hugetlbfs_fill_super+0xb4/0x1a0\n kernel: Code: 48 8b 3b e8 3e c6 ed ff 48 85 c0 48 89 45 20 0f 84 d6 00 00 00 48 b8 ff ff ff ff ff ff ff 7f 4c 89 e7 49 89 44 24 20 48 8b 03 \u003c8b\u003e 48 28 b8 00 10 00 00 48 d3 e0 49 89 44 24 18 48 8b 03 8b 40 28\n kernel: RSP: 0018:ffffbe9960fcbd48 EFLAGS: 00010246\n kernel: RAX: 0000000000000000 RBX: ffff9af5272ae780 RCX: 0000000000372004\n kernel: RDX: ffffffffffffffff RSI: ffffffffffffffff RDI: ffff9af555e9b000\n kernel: RBP: ffff9af52ee66b00 R08: 0000000000000040 R09: 0000000000370004\n kernel: R10: ffffbe9960fcbd48 R11: 0000000000000040 R12: ffff9af555e9b000\n kernel: R13: ffffffffa66b86c0 R14: ffff9af507d2f400 R15: ffff9af507d2f400\n kernel: FS:  00007ffbc0ba4740(0000) GS:ffff9b0bd7000000(0000) knlGS:0000000000000000\n kernel: CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n kernel: CR2: 0000000000000028 CR3: 00000001b1ee0000 CR4: 00000000001506f0\n kernel: Call Trace:\n kernel:  \u003cTASK\u003e\n kernel:  ? __die_body+0x1a/0x60\n kernel:  ? page_fault_oops+0x16f/0x4a0\n kernel:  ? search_bpf_extables+0x65/0x70\n kernel:  ? fixup_exception+0x22/0x310\n kernel:  ? exc_page_fault+0x69/0x150\n kernel:  ? asm_exc_page_fault+0x22/0x30\n kernel:  ? __pfx_hugetlbfs_fill_super+0x10/0x10\n kernel:  ? hugetlbfs_fill_super+0xb4/0x1a0\n kernel:  ? hugetlbfs_fill_super+0x28/0x1a0\n kernel:  ? __pfx_hugetlbfs_fill_super+0x10/0x10\n kernel:  vfs_get_super+0x40/0xa0\n kernel:  ? __pfx_bpf_lsm_capable+0x10/0x10\n kernel:  vfs_get_tree+0x25/0xd0\n kernel:  vfs_cmd_create+0x64/0xe0\n kernel:  __x64_sys_fsconfig+0x395/0x410\n kernel:  do_syscall_64+0x80/0x160\n kernel:  ? syscall_exit_to_user_mode+0x82/0x240\n kernel:  ? do_syscall_64+0x8d/0x160\n kernel:  ? syscall_exit_to_user_mode+0x82/0x240\n kernel:  ? do_syscall_64+0x8d/0x160\n kernel:  ? exc_page_fault+0x69/0x150\n kernel:  entry_SYSCALL_64_after_hwframe+0x6e/0x76\n kernel: RIP: 0033:0x7ffbc0cb87c9\n kernel: Code: 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 \u003c48\u003e 3d 01 f0 ff ff 73 01 c3 48 8b 0d 97 96 0d 00 f7 d8 64 89 01 48\n kernel: RSP: 002b:00007ffc29d2f388 EFLAGS: 00000206 ORIG_RAX: 00000000000001af\n kernel: RAX: fffffffffff\n---truncated---",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26688",
          "url": "https://www.suse.com/security/cve/CVE-2024-26688"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222482 for CVE-2024-26688",
          "url": "https://bugzilla.suse.com/1222482"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:29:53Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26688"
    },
    {
      "cve": "CVE-2024-26700",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26700"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/display: Fix MST Null Ptr for RV\n\nThe change try to fix below error specific to RV platform:\n\nBUG: kernel NULL pointer dereference, address: 0000000000000008\nPGD 0 P4D 0\nOops: 0000 [#1] PREEMPT SMP NOPTI\nCPU: 4 PID: 917 Comm: sway Not tainted 6.3.9-arch1-1 #1 124dc55df4f5272ccb409f39ef4872fc2b3376a2\nHardware name: LENOVO 20NKS01Y00/20NKS01Y00, BIOS R12ET61W(1.31 ) 07/28/2022\nRIP: 0010:drm_dp_atomic_find_time_slots+0x5e/0x260 [drm_display_helper]\nCode: 01 00 00 48 8b 85 60 05 00 00 48 63 80 88 00 00 00 3b 43 28 0f 8d 2e 01 00 00 48 8b 53 30 48 8d 04 80 48 8d 04 c2 48 8b 40 18 \u003c48\u003e 8\u003e\nRSP: 0018:ffff960cc2df77d8 EFLAGS: 00010293\nRAX: 0000000000000000 RBX: ffff8afb87e81280 RCX: 0000000000000224\nRDX: ffff8afb9ee37c00 RSI: ffff8afb8da1a578 RDI: ffff8afb87e81280\nRBP: ffff8afb83d67000 R08: 0000000000000001 R09: ffff8afb9652f850\nR10: ffff960cc2df7908 R11: 0000000000000002 R12: 0000000000000000\nR13: ffff8afb8d7688a0 R14: ffff8afb8da1a578 R15: 0000000000000224\nFS:  00007f4dac35ce00(0000) GS:ffff8afe30b00000(0000) knlGS:0000000000000000\nCS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 0000000000000008 CR3: 000000010ddc6000 CR4: 00000000003506e0\nCall Trace:\n \u003cTASK\u003e\n ? __die+0x23/0x70\n ? page_fault_oops+0x171/0x4e0\n ? plist_add+0xbe/0x100\n ? exc_page_fault+0x7c/0x180\n ? asm_exc_page_fault+0x26/0x30\n ? drm_dp_atomic_find_time_slots+0x5e/0x260 [drm_display_helper 0e67723696438d8e02b741593dd50d80b44c2026]\n ? drm_dp_atomic_find_time_slots+0x28/0x260 [drm_display_helper 0e67723696438d8e02b741593dd50d80b44c2026]\n compute_mst_dsc_configs_for_link+0x2ff/0xa40 [amdgpu 62e600d2a75e9158e1cd0a243bdc8e6da040c054]\n ? fill_plane_buffer_attributes+0x419/0x510 [amdgpu 62e600d2a75e9158e1cd0a243bdc8e6da040c054]\n compute_mst_dsc_configs_for_state+0x1e1/0x250 [amdgpu 62e600d2a75e9158e1cd0a243bdc8e6da040c054]\n amdgpu_dm_atomic_check+0xecd/0x1190 [amdgpu 62e600d2a75e9158e1cd0a243bdc8e6da040c054]\n drm_atomic_check_only+0x5c5/0xa40\n drm_mode_atomic_ioctl+0x76e/0xbc0\n ? _copy_to_user+0x25/0x30\n ? drm_ioctl+0x296/0x4b0\n ? __pfx_drm_mode_atomic_ioctl+0x10/0x10\n drm_ioctl_kernel+0xcd/0x170\n drm_ioctl+0x26d/0x4b0\n ? __pfx_drm_mode_atomic_ioctl+0x10/0x10\n amdgpu_drm_ioctl+0x4e/0x90 [amdgpu 62e600d2a75e9158e1cd0a243bdc8e6da040c054]\n __x64_sys_ioctl+0x94/0xd0\n do_syscall_64+0x60/0x90\n ? do_syscall_64+0x6c/0x90\n entry_SYSCALL_64_after_hwframe+0x72/0xdc\nRIP: 0033:0x7f4dad17f76f\nCode: 00 48 89 44 24 18 31 c0 48 8d 44 24 60 c7 04 24 10 00 00 00 48 89 44 24 08 48 8d 44 24 20 48 89 44 24 10 b8 10 00 00 00 0f 05 \u003c89\u003e c\u003e\nRSP: 002b:00007ffd9ae859f0 EFLAGS: 00000246 ORIG_RAX: 0000000000000010\nRAX: ffffffffffffffda RBX: 000055e255a55900 RCX: 00007f4dad17f76f\nRDX: 00007ffd9ae85a90 RSI: 00000000c03864bc RDI: 000000000000000b\nRBP: 00007ffd9ae85a90 R08: 0000000000000003 R09: 0000000000000003\nR10: 0000000000000000 R11: 0000000000000246 R12: 00000000c03864bc\nR13: 000000000000000b R14: 000055e255a7fc60 R15: 000055e255a01eb0\n \u003c/TASK\u003e\nModules linked in: rfcomm snd_seq_dummy snd_hrtimer snd_seq snd_seq_device ccm cmac algif_hash algif_skcipher af_alg joydev mousedev bnep \u003e\n typec libphy k10temp ipmi_msghandler roles i2c_scmi acpi_cpufreq mac_hid nft_reject_inet nf_reject_ipv4 nf_reject_ipv6 nft_reject nft_mas\u003e\nCR2: 0000000000000008\n---[ end trace 0000000000000000 ]---\nRIP: 0010:drm_dp_atomic_find_time_slots+0x5e/0x260 [drm_display_helper]\nCode: 01 00 00 48 8b 85 60 05 00 00 48 63 80 88 00 00 00 3b 43 28 0f 8d 2e 01 00 00 48 8b 53 30 48 8d 04 80 48 8d 04 c2 48 8b 40 18 \u003c48\u003e 8\u003e\nRSP: 0018:ffff960cc2df77d8 EFLAGS: 00010293\nRAX: 0000000000000000 RBX: ffff8afb87e81280 RCX: 0000000000000224\nRDX: ffff8afb9ee37c00 RSI: ffff8afb8da1a578 RDI: ffff8afb87e81280\nRBP: ffff8afb83d67000 R08: 0000000000000001 R09: ffff8afb9652f850\nR10: ffff960cc2df7908 R11: 0000000000000002 R12: 0000000000000000\nR13: ffff8afb8d7688a0 R14: ffff8afb8da1a578 R15: 0000000000000224\nFS:  00007f4dac35ce00(0000) GS:ffff8afe30b00000(0000\n---truncated---",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26700",
          "url": "https://www.suse.com/security/cve/CVE-2024-26700"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222870 for CVE-2024-26700",
          "url": "https://bugzilla.suse.com/1222870"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:29:53Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26700"
    },
    {
      "cve": "CVE-2024-26702",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26702"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\niio: magnetometer: rm3100: add boundary check for the value read from RM3100_REG_TMRC\n\nRecently, we encounter kernel crash in function rm3100_common_probe\ncaused by out of bound access of array rm3100_samp_rates (because of\nunderlying hardware failures). Add boundary check to prevent out of\nbound access.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26702",
          "url": "https://www.suse.com/security/cve/CVE-2024-26702"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222424 for CVE-2024-26702",
          "url": "https://bugzilla.suse.com/1222424"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:29:53Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26702"
    },
    {
      "cve": "CVE-2024-26733",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26733"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\narp: Prevent overflow in arp_req_get().\n\nsyzkaller reported an overflown write in arp_req_get(). [0]\n\nWhen ioctl(SIOCGARP) is issued, arp_req_get() looks up an neighbour\nentry and copies neigh-\u003eha to struct arpreq.arp_ha.sa_data.\n\nThe arp_ha here is struct sockaddr, not struct sockaddr_storage, so\nthe sa_data buffer is just 14 bytes.\n\nIn the splat below, 2 bytes are overflown to the next int field,\narp_flags.  We initialise the field just after the memcpy(), so it\u0027s\nnot a problem.\n\nHowever, when dev-\u003eaddr_len is greater than 22 (e.g. MAX_ADDR_LEN),\narp_netmask is overwritten, which could be set as htonl(0xFFFFFFFFUL)\nin arp_ioctl() before calling arp_req_get().\n\nTo avoid the overflow, let\u0027s limit the max length of memcpy().\n\nNote that commit b5f0de6df6dc (\"net: dev: Convert sa_data to flexible\narray in struct sockaddr\") just silenced syzkaller.\n\n[0]:\nmemcpy: detected field-spanning write (size 16) of single field \"r-\u003earp_ha.sa_data\" at net/ipv4/arp.c:1128 (size 14)\nWARNING: CPU: 0 PID: 144638 at net/ipv4/arp.c:1128 arp_req_get+0x411/0x4a0 net/ipv4/arp.c:1128\nModules linked in:\nCPU: 0 PID: 144638 Comm: syz-executor.4 Not tainted 6.1.74 #31\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.0-debian-1.16.0-5 04/01/2014\nRIP: 0010:arp_req_get+0x411/0x4a0 net/ipv4/arp.c:1128\nCode: fd ff ff e8 41 42 de fb b9 0e 00 00 00 4c 89 fe 48 c7 c2 20 6d ab 87 48 c7 c7 80 6d ab 87 c6 05 25 af 72 04 01 e8 5f 8d ad fb \u003c0f\u003e 0b e9 6c fd ff ff e8 13 42 de fb be 03 00 00 00 4c 89 e7 e8 a6\nRSP: 0018:ffffc900050b7998 EFLAGS: 00010286\nRAX: 0000000000000000 RBX: ffff88803a815000 RCX: 0000000000000000\nRDX: 0000000000000000 RSI: ffffffff8641a44a RDI: 0000000000000001\nRBP: ffffc900050b7a98 R08: 0000000000000001 R09: 0000000000000000\nR10: 0000000000000000 R11: 203a7970636d656d R12: ffff888039c54000\nR13: 1ffff92000a16f37 R14: ffff88803a815084 R15: 0000000000000010\nFS:  00007f172bf306c0(0000) GS:ffff88805aa00000(0000) knlGS:0000000000000000\nCS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 00007f172b3569f0 CR3: 0000000057f12005 CR4: 0000000000770ef0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\nPKRU: 55555554\nCall Trace:\n \u003cTASK\u003e\n arp_ioctl+0x33f/0x4b0 net/ipv4/arp.c:1261\n inet_ioctl+0x314/0x3a0 net/ipv4/af_inet.c:981\n sock_do_ioctl+0xdf/0x260 net/socket.c:1204\n sock_ioctl+0x3ef/0x650 net/socket.c:1321\n vfs_ioctl fs/ioctl.c:51 [inline]\n __do_sys_ioctl fs/ioctl.c:870 [inline]\n __se_sys_ioctl fs/ioctl.c:856 [inline]\n __x64_sys_ioctl+0x18e/0x220 fs/ioctl.c:856\n do_syscall_x64 arch/x86/entry/common.c:51 [inline]\n do_syscall_64+0x37/0x90 arch/x86/entry/common.c:81\n entry_SYSCALL_64_after_hwframe+0x64/0xce\nRIP: 0033:0x7f172b262b8d\nCode: 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 \u003c48\u003e 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48\nRSP: 002b:00007f172bf300b8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010\nRAX: ffffffffffffffda RBX: 00007f172b3abf80 RCX: 00007f172b262b8d\nRDX: 0000000020000000 RSI: 0000000000008954 RDI: 0000000000000003\nRBP: 00007f172b2d3493 R08: 0000000000000000 R09: 0000000000000000\nR10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000\nR13: 000000000000000b R14: 00007f172b3abf80 R15: 00007f172bf10000\n \u003c/TASK\u003e",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26733",
          "url": "https://www.suse.com/security/cve/CVE-2024-26733"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222585 for CVE-2024-26733",
          "url": "https://bugzilla.suse.com/1222585"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:29:53Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26733"
    },
    {
      "cve": "CVE-2024-26739",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26739"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/sched: act_mirred: don\u0027t override retval if we already lost the skb\n\nIf we\u0027re redirecting the skb, and haven\u0027t called tcf_mirred_forward(),\nyet, we need to tell the core to drop the skb by setting the retcode\nto SHOT. If we have called tcf_mirred_forward(), however, the skb\nis out of our hands and returning SHOT will lead to UaF.\n\nMove the retval override to the error path which actually need it.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26739",
          "url": "https://www.suse.com/security/cve/CVE-2024-26739"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222559 for CVE-2024-26739",
          "url": "https://bugzilla.suse.com/1222559"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:29:53Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26739"
    },
    {
      "cve": "CVE-2024-26764",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26764"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfs/aio: Restrict kiocb_set_cancel_fn() to I/O submitted via libaio\n\nIf kiocb_set_cancel_fn() is called for I/O submitted via io_uring, the\nfollowing kernel warning appears:\n\nWARNING: CPU: 3 PID: 368 at fs/aio.c:598 kiocb_set_cancel_fn+0x9c/0xa8\nCall trace:\n kiocb_set_cancel_fn+0x9c/0xa8\n ffs_epfile_read_iter+0x144/0x1d0\n io_read+0x19c/0x498\n io_issue_sqe+0x118/0x27c\n io_submit_sqes+0x25c/0x5fc\n __arm64_sys_io_uring_enter+0x104/0xab0\n invoke_syscall+0x58/0x11c\n el0_svc_common+0xb4/0xf4\n do_el0_svc+0x2c/0xb0\n el0_svc+0x2c/0xa4\n el0t_64_sync_handler+0x68/0xb4\n el0t_64_sync+0x1a4/0x1a8\n\nFix this by setting the IOCB_AIO_RW flag for read and write I/O that is\nsubmitted by libaio.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26764",
          "url": "https://www.suse.com/security/cve/CVE-2024-26764"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222721 for CVE-2024-26764",
          "url": "https://bugzilla.suse.com/1222721"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:29:53Z",
          "details": "low"
        }
      ],
      "title": "CVE-2024-26764"
    },
    {
      "cve": "CVE-2024-26766",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26766"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nIB/hfi1: Fix sdma.h tx-\u003enum_descs off-by-one error\n\nUnfortunately the commit `fd8958efe877` introduced another error\ncausing the `descs` array to overflow. This reults in further crashes\neasily reproducible by `sendmsg` system call.\n\n[ 1080.836473] general protection fault, probably for non-canonical address 0x400300015528b00a: 0000 [#1] PREEMPT SMP PTI\n[ 1080.869326] RIP: 0010:hfi1_ipoib_build_ib_tx_headers.constprop.0+0xe1/0x2b0 [hfi1]\n--\n[ 1080.974535] Call Trace:\n[ 1080.976990]  \u003cTASK\u003e\n[ 1081.021929]  hfi1_ipoib_send_dma_common+0x7a/0x2e0 [hfi1]\n[ 1081.027364]  hfi1_ipoib_send_dma_list+0x62/0x270 [hfi1]\n[ 1081.032633]  hfi1_ipoib_send+0x112/0x300 [hfi1]\n[ 1081.042001]  ipoib_start_xmit+0x2a9/0x2d0 [ib_ipoib]\n[ 1081.046978]  dev_hard_start_xmit+0xc4/0x210\n--\n[ 1081.148347]  __sys_sendmsg+0x59/0xa0\n\ncrash\u003e ipoib_txreq 0xffff9cfeba229f00\nstruct ipoib_txreq {\n  txreq = {\n    list = {\n      next = 0xffff9cfeba229f00,\n      prev = 0xffff9cfeba229f00\n    },\n    descp = 0xffff9cfeba229f40,\n    coalesce_buf = 0x0,\n    wait = 0xffff9cfea4e69a48,\n    complete = 0xffffffffc0fe0760 \u003chfi1_ipoib_sdma_complete\u003e,\n    packet_len = 0x46d,\n    tlen = 0x0,\n    num_desc = 0x0,\n    desc_limit = 0x6,\n    next_descq_idx = 0x45c,\n    coalesce_idx = 0x0,\n    flags = 0x0,\n    descs = {{\n        qw = {0x8024000120dffb00, 0x4}  # SDMA_DESC0_FIRST_DESC_FLAG (bit 63)\n      }, {\n        qw = {  0x3800014231b108, 0x4}\n      }, {\n        qw = { 0x310000e4ee0fcf0, 0x8}\n      }, {\n        qw = {  0x3000012e9f8000, 0x8}\n      }, {\n        qw = {  0x59000dfb9d0000, 0x8}\n      }, {\n        qw = {  0x78000e02e40000, 0x8}\n      }}\n  },\n  sdma_hdr =  0x400300015528b000,  \u003c\u003c\u003c invalid pointer in the tx request structure\n  sdma_status = 0x0,                   SDMA_DESC0_LAST_DESC_FLAG (bit 62)\n  complete = 0x0,\n  priv = 0x0,\n  txq = 0xffff9cfea4e69880,\n  skb = 0xffff9d099809f400\n}\n\nIf an SDMA send consists of exactly 6 descriptors and requires dword\npadding (in the 7th descriptor), the sdma_txreq descriptor array is not\nproperly expanded and the packet will overflow into the container\nstructure. This results in a panic when the send completion runs. The\nexact panic varies depending on what elements of the container structure\nget corrupted. The fix is to use the correct expression in\n_pad_sdma_tx_descs() to test the need to expand the descriptor array.\n\nWith this patch the crashes are no longer reproducible and the machine is\nstable.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26766",
          "url": "https://www.suse.com/security/cve/CVE-2024-26766"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222726 for CVE-2024-26766",
          "url": "https://bugzilla.suse.com/1222726"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222882 for CVE-2024-26766",
          "url": "https://bugzilla.suse.com/1222882"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:29:53Z",
          "details": "important"
        }
      ],
      "title": "CVE-2024-26766"
    },
    {
      "cve": "CVE-2024-26772",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26772"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\next4: avoid allocating blocks from corrupted group in ext4_mb_find_by_goal()\n\nPlaces the logic for checking if the group\u0027s block bitmap is corrupt under\nthe protection of the group lock to avoid allocating blocks from the group\nwith a corrupted block bitmap.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26772",
          "url": "https://www.suse.com/security/cve/CVE-2024-26772"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222613 for CVE-2024-26772",
          "url": "https://bugzilla.suse.com/1222613"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:29:53Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26772"
    },
    {
      "cve": "CVE-2024-26773",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26773"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\next4: avoid allocating blocks from corrupted group in ext4_mb_try_best_found()\n\nDetermine if the group block bitmap is corrupted before using ac_b_ex in\next4_mb_try_best_found() to avoid allocating blocks from a group with a\ncorrupted block bitmap in the following concurrency and making the\nsituation worse.\n\next4_mb_regular_allocator\n  ext4_lock_group(sb, group)\n  ext4_mb_good_group\n   // check if the group bbitmap is corrupted\n  ext4_mb_complex_scan_group\n   // Scan group gets ac_b_ex but doesn\u0027t use it\n  ext4_unlock_group(sb, group)\n                           ext4_mark_group_bitmap_corrupted(group)\n                           // The block bitmap was corrupted during\n                           // the group unlock gap.\n  ext4_mb_try_best_found\n    ext4_lock_group(ac-\u003eac_sb, group)\n    ext4_mb_use_best_found\n      mb_mark_used\n      // Allocating blocks in block bitmap corrupted group",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26773",
          "url": "https://www.suse.com/security/cve/CVE-2024-26773"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222618 for CVE-2024-26773",
          "url": "https://bugzilla.suse.com/1222618"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:29:53Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26773"
    },
    {
      "cve": "CVE-2024-26783",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26783"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm/vmscan: fix a bug calling wakeup_kswapd() with a wrong zone index\n\nWith numa balancing on, when a numa system is running where a numa node\ndoesn\u0027t have its local memory so it has no managed zones, the following\noops has been observed.  It\u0027s because wakeup_kswapd() is called with a\nwrong zone index, -1.  Fixed it by checking the index before calling\nwakeup_kswapd().\n\n\u003e BUG: unable to handle page fault for address: 00000000000033f3\n\u003e #PF: supervisor read access in kernel mode\n\u003e #PF: error_code(0x0000) - not-present page\n\u003e PGD 0 P4D 0\n\u003e Oops: 0000 [#1] PREEMPT SMP NOPTI\n\u003e CPU: 2 PID: 895 Comm: masim Not tainted 6.6.0-dirty #255\n\u003e Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS\n\u003e    rel-1.16.0-0-gd239552ce722-prebuilt.qemu.org 04/01/2014\n\u003e RIP: 0010:wakeup_kswapd (./linux/mm/vmscan.c:7812)\n\u003e Code: (omitted)\n\u003e RSP: 0000:ffffc90004257d58 EFLAGS: 00010286\n\u003e RAX: ffffffffffffffff RBX: ffff88883fff0480 RCX: 0000000000000003\n\u003e RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffff88883fff0480\n\u003e RBP: ffffffffffffffff R08: ff0003ffffffffff R09: ffffffffffffffff\n\u003e R10: ffff888106c95540 R11: 0000000055555554 R12: 0000000000000003\n\u003e R13: 0000000000000000 R14: 0000000000000000 R15: ffff88883fff0940\n\u003e FS:  00007fc4b8124740(0000) GS:ffff888827c00000(0000) knlGS:0000000000000000\n\u003e CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n\u003e CR2: 00000000000033f3 CR3: 000000026cc08004 CR4: 0000000000770ee0\n\u003e DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n\u003e DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\n\u003e PKRU: 55555554\n\u003e Call Trace:\n\u003e  \u003cTASK\u003e\n\u003e ? __die\n\u003e ? page_fault_oops\n\u003e ? __pte_offset_map_lock\n\u003e ? exc_page_fault\n\u003e ? asm_exc_page_fault\n\u003e ? wakeup_kswapd\n\u003e migrate_misplaced_page\n\u003e __handle_mm_fault\n\u003e handle_mm_fault\n\u003e do_user_addr_fault\n\u003e exc_page_fault\n\u003e asm_exc_page_fault\n\u003e RIP: 0033:0x55b897ba0808\n\u003e Code: (omitted)\n\u003e RSP: 002b:00007ffeefa821a0 EFLAGS: 00010287\n\u003e RAX: 000055b89983acd0 RBX: 00007ffeefa823f8 RCX: 000055b89983acd0\n\u003e RDX: 00007fc2f8122010 RSI: 0000000000020000 RDI: 000055b89983acd0\n\u003e RBP: 00007ffeefa821a0 R08: 0000000000000037 R09: 0000000000000075\n\u003e R10: 0000000000000000 R11: 0000000000000202 R12: 0000000000000000\n\u003e R13: 00007ffeefa82410 R14: 000055b897ba5dd8 R15: 00007fc4b8340000\n\u003e  \u003c/TASK\u003e",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26783",
          "url": "https://www.suse.com/security/cve/CVE-2024-26783"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222615 for CVE-2024-26783",
          "url": "https://bugzilla.suse.com/1222615"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:29:53Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26783"
    },
    {
      "cve": "CVE-2024-26791",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26791"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: dev-replace: properly validate device names\n\nThere\u0027s a syzbot report that device name buffers passed to device\nreplace are not properly checked for string termination which could lead\nto a read out of bounds in getname_kernel().\n\nAdd a helper that validates both source and target device name buffers.\nFor devid as the source initialize the buffer to empty string in case\nsomething tries to read it later.\n\nThis was originally analyzed and fixed in a different way by Edward Adam\nDavis (see links).",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26791",
          "url": "https://www.suse.com/security/cve/CVE-2024-26791"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222793 for CVE-2024-26791",
          "url": "https://bugzilla.suse.com/1222793"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:29:53Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26791"
    },
    {
      "cve": "CVE-2024-26792",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26792"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: fix double free of anonymous device after snapshot creation failure\n\nWhen creating a snapshot we may do a double free of an anonymous device\nin case there\u0027s an error committing the transaction. The second free may\nresult in freeing an anonymous device number that was allocated by some\nother subsystem in the kernel or another btrfs filesystem.\n\nThe steps that lead to this:\n\n1) At ioctl.c:create_snapshot() we allocate an anonymous device number\n   and assign it to pending_snapshot-\u003eanon_dev;\n\n2) Then we call btrfs_commit_transaction() and end up at\n   transaction.c:create_pending_snapshot();\n\n3) There we call btrfs_get_new_fs_root() and pass it the anonymous device\n   number stored in pending_snapshot-\u003eanon_dev;\n\n4) btrfs_get_new_fs_root() frees that anonymous device number because\n   btrfs_lookup_fs_root() returned a root - someone else did a lookup\n   of the new root already, which could some task doing backref walking;\n\n5) After that some error happens in the transaction commit path, and at\n   ioctl.c:create_snapshot() we jump to the \u0027fail\u0027 label, and after\n   that we free again the same anonymous device number, which in the\n   meanwhile may have been reallocated somewhere else, because\n   pending_snapshot-\u003eanon_dev still has the same value as in step 1.\n\nRecently syzbot ran into this and reported the following trace:\n\n  ------------[ cut here ]------------\n  ida_free called for id=51 which is not allocated.\n  WARNING: CPU: 1 PID: 31038 at lib/idr.c:525 ida_free+0x370/0x420 lib/idr.c:525\n  Modules linked in:\n  CPU: 1 PID: 31038 Comm: syz-executor.2 Not tainted 6.8.0-rc4-syzkaller-00410-gc02197fc9076 #0\n  Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024\n  RIP: 0010:ida_free+0x370/0x420 lib/idr.c:525\n  Code: 10 42 80 3c 28 (...)\n  RSP: 0018:ffffc90015a67300 EFLAGS: 00010246\n  RAX: be5130472f5dd000 RBX: 0000000000000033 RCX: 0000000000040000\n  RDX: ffffc90009a7a000 RSI: 000000000003ffff RDI: 0000000000040000\n  RBP: ffffc90015a673f0 R08: ffffffff81577992 R09: 1ffff92002b4cdb4\n  R10: dffffc0000000000 R11: fffff52002b4cdb5 R12: 0000000000000246\n  R13: dffffc0000000000 R14: ffffffff8e256b80 R15: 0000000000000246\n  FS:  00007fca3f4b46c0(0000) GS:ffff8880b9500000(0000) knlGS:0000000000000000\n  CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n  CR2: 00007f167a17b978 CR3: 000000001ed26000 CR4: 0000000000350ef0\n  Call Trace:\n   \u003cTASK\u003e\n   btrfs_get_root_ref+0xa48/0xaf0 fs/btrfs/disk-io.c:1346\n   create_pending_snapshot+0xff2/0x2bc0 fs/btrfs/transaction.c:1837\n   create_pending_snapshots+0x195/0x1d0 fs/btrfs/transaction.c:1931\n   btrfs_commit_transaction+0xf1c/0x3740 fs/btrfs/transaction.c:2404\n   create_snapshot+0x507/0x880 fs/btrfs/ioctl.c:848\n   btrfs_mksubvol+0x5d0/0x750 fs/btrfs/ioctl.c:998\n   btrfs_mksnapshot+0xb5/0xf0 fs/btrfs/ioctl.c:1044\n   __btrfs_ioctl_snap_create+0x387/0x4b0 fs/btrfs/ioctl.c:1306\n   btrfs_ioctl_snap_create_v2+0x1ca/0x400 fs/btrfs/ioctl.c:1393\n   btrfs_ioctl+0xa74/0xd40\n   vfs_ioctl fs/ioctl.c:51 [inline]\n   __do_sys_ioctl fs/ioctl.c:871 [inline]\n   __se_sys_ioctl+0xfe/0x170 fs/ioctl.c:857\n   do_syscall_64+0xfb/0x240\n   entry_SYSCALL_64_after_hwframe+0x6f/0x77\n  RIP: 0033:0x7fca3e67dda9\n  Code: 28 00 00 00 (...)\n  RSP: 002b:00007fca3f4b40c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010\n  RAX: ffffffffffffffda RBX: 00007fca3e7abf80 RCX: 00007fca3e67dda9\n  RDX: 00000000200005c0 RSI: 0000000050009417 RDI: 0000000000000003\n  RBP: 00007fca3e6ca47a R08: 0000000000000000 R09: 0000000000000000\n  R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000\n  R13: 000000000000000b R14: 00007fca3e7abf80 R15: 00007fff6bf95658\n   \u003c/TASK\u003e\n\nWhere we get an explicit message where we attempt to free an anonymous\ndevice number that is not currently allocated. It happens in a different\ncode path from the example below, at btrfs_get_root_ref(), so this change\nmay not fix the case triggered by sy\n---truncated---",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26792",
          "url": "https://www.suse.com/security/cve/CVE-2024-26792"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222430 for CVE-2024-26792",
          "url": "https://bugzilla.suse.com/1222430"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:29:53Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26792"
    },
    {
      "cve": "CVE-2024-26816",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26816"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nx86, relocs: Ignore relocations in .notes section\n\nWhen building with CONFIG_XEN_PV=y, .text symbols are emitted into\nthe .notes section so that Xen can find the \"startup_xen\" entry point.\nThis information is used prior to booting the kernel, so relocations\nare not useful. In fact, performing relocations against the .notes\nsection means that the KASLR base is exposed since /sys/kernel/notes\nis world-readable.\n\nTo avoid leaking the KASLR base without breaking unprivileged tools that\nare expecting to read /sys/kernel/notes, skip performing relocations in\nthe .notes section. The values readable in .notes are then identical to\nthose found in System.map.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26816",
          "url": "https://www.suse.com/security/cve/CVE-2024-26816"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222624 for CVE-2024-26816",
          "url": "https://bugzilla.suse.com/1222624"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:29:53Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26816"
    },
    {
      "cve": "CVE-2024-26817",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26817"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\namdkfd: use calloc instead of kzalloc to avoid integer overflow\n\nThis uses calloc instead of doing the multiplication which might\noverflow.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26817",
          "url": "https://www.suse.com/security/cve/CVE-2024-26817"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222812 for CVE-2024-26817",
          "url": "https://bugzilla.suse.com/1222812"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:29:53Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26817"
    },
    {
      "cve": "CVE-2024-26820",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26820"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nhv_netvsc: Register VF in netvsc_probe if NET_DEVICE_REGISTER missed\n\nIf hv_netvsc driver is unloaded and reloaded, the NET_DEVICE_REGISTER\nhandler cannot perform VF register successfully as the register call\nis received before netvsc_probe is finished. This is because we\nregister register_netdevice_notifier() very early( even before\nvmbus_driver_register()).\nTo fix this, we try to register each such matching VF( if it is visible\nas a netdevice) at the end of netvsc_probe.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26820",
          "url": "https://www.suse.com/security/cve/CVE-2024-26820"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223078 for CVE-2024-26820",
          "url": "https://bugzilla.suse.com/1223078"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:29:53Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26820"
    },
    {
      "cve": "CVE-2024-26825",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26825"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnfc: nci: free rx_data_reassembly skb on NCI device cleanup\n\nrx_data_reassembly skb is stored during NCI data exchange for processing\nfragmented packets. It is dropped only when the last fragment is processed\nor when an NTF packet with NCI_OP_RF_DEACTIVATE_NTF opcode is received.\nHowever, the NCI device may be deallocated before that which leads to skb\nleak.\n\nAs by design the rx_data_reassembly skb is bound to the NCI device and\nnothing prevents the device to be freed before the skb is processed in\nsome way and cleaned, free it on the NCI device cleanup.\n\nFound by Linux Verification Center (linuxtesting.org) with Syzkaller.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26825",
          "url": "https://www.suse.com/security/cve/CVE-2024-26825"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223065 for CVE-2024-26825",
          "url": "https://bugzilla.suse.com/1223065"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:29:53Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26825"
    },
    {
      "cve": "CVE-2024-26830",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26830"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ni40e: Do not allow untrusted VF to remove administratively set MAC\n\nCurrently when PF administratively sets VF\u0027s MAC address and the VF\nis put down (VF tries to delete all MACs) then the MAC is removed\nfrom MAC filters and primary VF MAC is zeroed.\n\nDo not allow untrusted VF to remove primary MAC when it was set\nadministratively by PF.\n\nReproducer:\n1) Create VF\n2) Set VF interface up\n3) Administratively set the VF\u0027s MAC\n4) Put VF interface down\n\n[root@host ~]# echo 1 \u003e /sys/class/net/enp2s0f0/device/sriov_numvfs\n[root@host ~]# ip link set enp2s0f0v0 up\n[root@host ~]# ip link set enp2s0f0 vf 0 mac fe:6c:b5:da:c7:7d\n[root@host ~]# ip link show enp2s0f0\n23: enp2s0f0: \u003cBROADCAST,MULTICAST,UP,LOWER_UP\u003e mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000\n    link/ether 3c:ec:ef:b7:dd:04 brd ff:ff:ff:ff:ff:ff\n    vf 0     link/ether fe:6c:b5:da:c7:7d brd ff:ff:ff:ff:ff:ff, spoof checking on, link-state auto, trust off\n[root@host ~]# ip link set enp2s0f0v0 down\n[root@host ~]# ip link show enp2s0f0\n23: enp2s0f0: \u003cBROADCAST,MULTICAST,UP,LOWER_UP\u003e mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000\n    link/ether 3c:ec:ef:b7:dd:04 brd ff:ff:ff:ff:ff:ff\n    vf 0     link/ether 00:00:00:00:00:00 brd ff:ff:ff:ff:ff:ff, spoof checking on, link-state auto, trust off",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26830",
          "url": "https://www.suse.com/security/cve/CVE-2024-26830"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223012 for CVE-2024-26830",
          "url": "https://bugzilla.suse.com/1223012"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:29:53Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26830"
    },
    {
      "cve": "CVE-2024-26833",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26833"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/display: Fix memory leak in dm_sw_fini()\n\nAfter destroying dmub_srv, the memory associated with it is\nnot freed, causing a memory leak:\n\nunreferenced object 0xffff896302b45800 (size 1024):\n  comm \"(udev-worker)\", pid 222, jiffies 4294894636\n  hex dump (first 32 bytes):\n    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................\n    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................\n  backtrace (crc 6265fd77):\n    [\u003cffffffff993495ed\u003e] kmalloc_trace+0x29d/0x340\n    [\u003cffffffffc0ea4a94\u003e] dm_dmub_sw_init+0xb4/0x450 [amdgpu]\n    [\u003cffffffffc0ea4e55\u003e] dm_sw_init+0x15/0x2b0 [amdgpu]\n    [\u003cffffffffc0ba8557\u003e] amdgpu_device_init+0x1417/0x24e0 [amdgpu]\n    [\u003cffffffffc0bab285\u003e] amdgpu_driver_load_kms+0x15/0x190 [amdgpu]\n    [\u003cffffffffc0ba09c7\u003e] amdgpu_pci_probe+0x187/0x4e0 [amdgpu]\n    [\u003cffffffff9968fd1e\u003e] local_pci_probe+0x3e/0x90\n    [\u003cffffffff996918a3\u003e] pci_device_probe+0xc3/0x230\n    [\u003cffffffff99805872\u003e] really_probe+0xe2/0x480\n    [\u003cffffffff99805c98\u003e] __driver_probe_device+0x78/0x160\n    [\u003cffffffff99805daf\u003e] driver_probe_device+0x1f/0x90\n    [\u003cffffffff9980601e\u003e] __driver_attach+0xce/0x1c0\n    [\u003cffffffff99803170\u003e] bus_for_each_dev+0x70/0xc0\n    [\u003cffffffff99804822\u003e] bus_add_driver+0x112/0x210\n    [\u003cffffffff99807245\u003e] driver_register+0x55/0x100\n    [\u003cffffffff990012d1\u003e] do_one_initcall+0x41/0x300\n\nFix this by freeing dmub_srv after destroying it.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26833",
          "url": "https://www.suse.com/security/cve/CVE-2024-26833"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223036 for CVE-2024-26833",
          "url": "https://bugzilla.suse.com/1223036"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:29:53Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26833"
    },
    {
      "cve": "CVE-2024-26836",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26836"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nplatform/x86: think-lmi: Fix password opcode ordering for workstations\n\nThe Lenovo workstations require the password opcode to be run before\nthe attribute value is changed (if Admin password is enabled).\n\nTested on some Thinkpads to confirm they are OK with this order too.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26836",
          "url": "https://www.suse.com/security/cve/CVE-2024-26836"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222968 for CVE-2024-26836",
          "url": "https://bugzilla.suse.com/1222968"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:29:53Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26836"
    },
    {
      "cve": "CVE-2024-26840",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26840"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncachefiles: fix memory leak in cachefiles_add_cache()\n\nThe following memory leak was reported after unbinding /dev/cachefiles:\n\n==================================================================\nunreferenced object 0xffff9b674176e3c0 (size 192):\n  comm \"cachefilesd2\", pid 680, jiffies 4294881224\n  hex dump (first 32 bytes):\n    01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................\n    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................\n  backtrace (crc ea38a44b):\n    [\u003cffffffff8eb8a1a5\u003e] kmem_cache_alloc+0x2d5/0x370\n    [\u003cffffffff8e917f86\u003e] prepare_creds+0x26/0x2e0\n    [\u003cffffffffc002eeef\u003e] cachefiles_determine_cache_security+0x1f/0x120\n    [\u003cffffffffc00243ec\u003e] cachefiles_add_cache+0x13c/0x3a0\n    [\u003cffffffffc0025216\u003e] cachefiles_daemon_write+0x146/0x1c0\n    [\u003cffffffff8ebc4a3b\u003e] vfs_write+0xcb/0x520\n    [\u003cffffffff8ebc5069\u003e] ksys_write+0x69/0xf0\n    [\u003cffffffff8f6d4662\u003e] do_syscall_64+0x72/0x140\n    [\u003cffffffff8f8000aa\u003e] entry_SYSCALL_64_after_hwframe+0x6e/0x76\n==================================================================\n\nPut the reference count of cache_cred in cachefiles_daemon_unbind() to\nfix the problem. And also put cache_cred in cachefiles_add_cache() error\nbranch to avoid memory leaks.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26840",
          "url": "https://www.suse.com/security/cve/CVE-2024-26840"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222976 for CVE-2024-26840",
          "url": "https://bugzilla.suse.com/1222976"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:29:53Z",
          "details": "low"
        }
      ],
      "title": "CVE-2024-26840"
    },
    {
      "cve": "CVE-2024-26843",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26843"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nefi: runtime: Fix potential overflow of soft-reserved region size\n\nmd_size will have been narrowed if we have \u003e= 4GB worth of pages in a\nsoft-reserved region.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26843",
          "url": "https://www.suse.com/security/cve/CVE-2024-26843"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223014 for CVE-2024-26843",
          "url": "https://bugzilla.suse.com/1223014"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:29:53Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26843"
    },
    {
      "cve": "CVE-2024-26852",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26852"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/ipv6: avoid possible UAF in ip6_route_mpath_notify()\n\nsyzbot found another use-after-free in ip6_route_mpath_notify() [1]\n\nCommit f7225172f25a (\"net/ipv6: prevent use after free in\nip6_route_mpath_notify\") was not able to fix the root cause.\n\nWe need to defer the fib6_info_release() calls after\nip6_route_mpath_notify(), in the cleanup phase.\n\n[1]\nBUG: KASAN: slab-use-after-free in rt6_fill_node+0x1460/0x1ac0\nRead of size 4 at addr ffff88809a07fc64 by task syz-executor.2/23037\n\nCPU: 0 PID: 23037 Comm: syz-executor.2 Not tainted 6.8.0-rc4-syzkaller-01035-gea7f3cfaa588 #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024\nCall Trace:\n \u003cTASK\u003e\n  __dump_stack lib/dump_stack.c:88 [inline]\n  dump_stack_lvl+0x1e7/0x2e0 lib/dump_stack.c:106\n  print_address_description mm/kasan/report.c:377 [inline]\n  print_report+0x167/0x540 mm/kasan/report.c:488\n  kasan_report+0x142/0x180 mm/kasan/report.c:601\n rt6_fill_node+0x1460/0x1ac0\n  inet6_rt_notify+0x13b/0x290 net/ipv6/route.c:6184\n  ip6_route_mpath_notify net/ipv6/route.c:5198 [inline]\n  ip6_route_multipath_add net/ipv6/route.c:5404 [inline]\n  inet6_rtm_newroute+0x1d0f/0x2300 net/ipv6/route.c:5517\n  rtnetlink_rcv_msg+0x885/0x1040 net/core/rtnetlink.c:6597\n  netlink_rcv_skb+0x1e3/0x430 net/netlink/af_netlink.c:2543\n  netlink_unicast_kernel net/netlink/af_netlink.c:1341 [inline]\n  netlink_unicast+0x7ea/0x980 net/netlink/af_netlink.c:1367\n  netlink_sendmsg+0xa3b/0xd70 net/netlink/af_netlink.c:1908\n  sock_sendmsg_nosec net/socket.c:730 [inline]\n  __sock_sendmsg+0x221/0x270 net/socket.c:745\n  ____sys_sendmsg+0x525/0x7d0 net/socket.c:2584\n  ___sys_sendmsg net/socket.c:2638 [inline]\n  __sys_sendmsg+0x2b0/0x3a0 net/socket.c:2667\n do_syscall_64+0xf9/0x240\n entry_SYSCALL_64_after_hwframe+0x6f/0x77\nRIP: 0033:0x7f73dd87dda9\nCode: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 \u003c48\u003e 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48\nRSP: 002b:00007f73de6550c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e\nRAX: ffffffffffffffda RBX: 00007f73dd9ac050 RCX: 00007f73dd87dda9\nRDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000005\nRBP: 00007f73dd8ca47a R08: 0000000000000000 R09: 0000000000000000\nR10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000\nR13: 000000000000006e R14: 00007f73dd9ac050 R15: 00007ffdbdeb7858\n \u003c/TASK\u003e\n\nAllocated by task 23037:\n  kasan_save_stack mm/kasan/common.c:47 [inline]\n  kasan_save_track+0x3f/0x80 mm/kasan/common.c:68\n  poison_kmalloc_redzone mm/kasan/common.c:372 [inline]\n  __kasan_kmalloc+0x98/0xb0 mm/kasan/common.c:389\n  kasan_kmalloc include/linux/kasan.h:211 [inline]\n  __do_kmalloc_node mm/slub.c:3981 [inline]\n  __kmalloc+0x22e/0x490 mm/slub.c:3994\n  kmalloc include/linux/slab.h:594 [inline]\n  kzalloc include/linux/slab.h:711 [inline]\n  fib6_info_alloc+0x2e/0xf0 net/ipv6/ip6_fib.c:155\n  ip6_route_info_create+0x445/0x12b0 net/ipv6/route.c:3758\n  ip6_route_multipath_add net/ipv6/route.c:5298 [inline]\n  inet6_rtm_newroute+0x744/0x2300 net/ipv6/route.c:5517\n  rtnetlink_rcv_msg+0x885/0x1040 net/core/rtnetlink.c:6597\n  netlink_rcv_skb+0x1e3/0x430 net/netlink/af_netlink.c:2543\n  netlink_unicast_kernel net/netlink/af_netlink.c:1341 [inline]\n  netlink_unicast+0x7ea/0x980 net/netlink/af_netlink.c:1367\n  netlink_sendmsg+0xa3b/0xd70 net/netlink/af_netlink.c:1908\n  sock_sendmsg_nosec net/socket.c:730 [inline]\n  __sock_sendmsg+0x221/0x270 net/socket.c:745\n  ____sys_sendmsg+0x525/0x7d0 net/socket.c:2584\n  ___sys_sendmsg net/socket.c:2638 [inline]\n  __sys_sendmsg+0x2b0/0x3a0 net/socket.c:2667\n do_syscall_64+0xf9/0x240\n entry_SYSCALL_64_after_hwframe+0x6f/0x77\n\nFreed by task 16:\n  kasan_save_stack mm/kasan/common.c:47 [inline]\n  kasan_save_track+0x3f/0x80 mm/kasan/common.c:68\n  kasan_save_free_info+0x4e/0x60 mm/kasan/generic.c:640\n  poison_slab_object+0xa6/0xe0 m\n---truncated---",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26852",
          "url": "https://www.suse.com/security/cve/CVE-2024-26852"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223057 for CVE-2024-26852",
          "url": "https://bugzilla.suse.com/1223057"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223059 for CVE-2024-26852",
          "url": "https://bugzilla.suse.com/1223059"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:29:53Z",
          "details": "important"
        }
      ],
      "title": "CVE-2024-26852"
    },
    {
      "cve": "CVE-2024-26853",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26853"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nigc: avoid returning frame twice in XDP_REDIRECT\n\nWhen a frame can not be transmitted in XDP_REDIRECT\n(e.g. due to a full queue), it is necessary to free\nit by calling xdp_return_frame_rx_napi.\n\nHowever, this is the responsibility of the caller of\nthe ndo_xdp_xmit (see for example bq_xmit_all in\nkernel/bpf/devmap.c) and thus calling it inside\nigc_xdp_xmit (which is the ndo_xdp_xmit of the igc\ndriver) as well will lead to memory corruption.\n\nIn fact, bq_xmit_all expects that it can return all\nframes after the last successfully transmitted one.\nTherefore, break for the first not transmitted frame,\nbut do not call xdp_return_frame_rx_napi in igc_xdp_xmit.\nThis is equally implemented in other Intel drivers\nsuch as the igb.\n\nThere are two alternatives to this that were rejected:\n1. Return num_frames as all the frames would have been\n   transmitted and release them inside igc_xdp_xmit.\n   While it might work technically, it is not what\n   the return value is meant to represent (i.e. the\n   number of SUCCESSFULLY transmitted packets).\n2. Rework kernel/bpf/devmap.c and all drivers to\n   support non-consecutively dropped packets.\n   Besides being complex, it likely has a negative\n   performance impact without a significant gain\n   since it is anyway unlikely that the next frame\n   can be transmitted if the previous one was dropped.\n\nThe memory corruption can be reproduced with\nthe following script which leads to a kernel panic\nafter a few seconds.  It basically generates more\ntraffic than a i225 NIC can transmit and pushes it\nvia XDP_REDIRECT from a virtual interface to the\nphysical interface where frames get dropped.\n\n   #!/bin/bash\n   INTERFACE=enp4s0\n   INTERFACE_IDX=`cat /sys/class/net/$INTERFACE/ifindex`\n\n   sudo ip link add dev veth1 type veth peer name veth2\n   sudo ip link set up $INTERFACE\n   sudo ip link set up veth1\n   sudo ip link set up veth2\n\n   cat \u003c\u003c EOF \u003e redirect.bpf.c\n\n   SEC(\"prog\")\n   int redirect(struct xdp_md *ctx)\n   {\n       return bpf_redirect($INTERFACE_IDX, 0);\n   }\n\n   char _license[] SEC(\"license\") = \"GPL\";\n   EOF\n   clang -O2 -g -Wall -target bpf -c redirect.bpf.c -o redirect.bpf.o\n   sudo ip link set veth2 xdp obj redirect.bpf.o\n\n   cat \u003c\u003c EOF \u003e pass.bpf.c\n\n   SEC(\"prog\")\n   int pass(struct xdp_md *ctx)\n   {\n       return XDP_PASS;\n   }\n\n   char _license[] SEC(\"license\") = \"GPL\";\n   EOF\n   clang -O2 -g -Wall -target bpf -c pass.bpf.c -o pass.bpf.o\n   sudo ip link set $INTERFACE xdp obj pass.bpf.o\n\n   cat \u003c\u003c EOF \u003e trafgen.cfg\n\n   {\n     /* Ethernet Header */\n     0xe8, 0x6a, 0x64, 0x41, 0xbf, 0x46,\n     0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF,\n     const16(ETH_P_IP),\n\n     /* IPv4 Header */\n     0b01000101, 0,   # IPv4 version, IHL, TOS\n     const16(1028),   # IPv4 total length (UDP length + 20 bytes (IP header))\n     const16(2),      # IPv4 ident\n     0b01000000, 0,   # IPv4 flags, fragmentation off\n     64,              # IPv4 TTL\n     17,              # Protocol UDP\n     csumip(14, 33),  # IPv4 checksum\n\n     /* UDP Header */\n     10,  0, 1, 1,    # IP Src - adapt as needed\n     10,  0, 1, 2,    # IP Dest - adapt as needed\n     const16(6666),   # UDP Src Port\n     const16(6666),   # UDP Dest Port\n     const16(1008),   # UDP length (UDP header 8 bytes + payload length)\n     csumudp(14, 34), # UDP checksum\n\n     /* Payload */\n     fill(\u0027W\u0027, 1000),\n   }\n   EOF\n\n   sudo trafgen -i trafgen.cfg -b3000MB -o veth1 --cpp",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26853",
          "url": "https://www.suse.com/security/cve/CVE-2024-26853"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223061 for CVE-2024-26853",
          "url": "https://bugzilla.suse.com/1223061"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:29:53Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26853"
    },
    {
      "cve": "CVE-2024-26855",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26855"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: ice: Fix potential NULL pointer dereference in ice_bridge_setlink()\n\nThe function ice_bridge_setlink() may encounter a NULL pointer dereference\nif nlmsg_find_attr() returns NULL and br_spec is dereferenced subsequently\nin nla_for_each_nested(). To address this issue, add a check to ensure that\nbr_spec is not NULL before proceeding with the nested attribute iteration.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26855",
          "url": "https://www.suse.com/security/cve/CVE-2024-26855"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223051 for CVE-2024-26855",
          "url": "https://bugzilla.suse.com/1223051"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:29:53Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26855"
    },
    {
      "cve": "CVE-2024-26856",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26856"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: sparx5: Fix use after free inside sparx5_del_mact_entry\n\nBased on the static analyzis of the code it looks like when an entry\nfrom the MAC table was removed, the entry was still used after being\nfreed. More precise the vid of the mac_entry was used after calling\ndevm_kfree on the mac_entry.\nThe fix consists in first using the vid of the mac_entry to delete the\nentry from the HW and after that to free it.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26856",
          "url": "https://www.suse.com/security/cve/CVE-2024-26856"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223052 for CVE-2024-26856",
          "url": "https://bugzilla.suse.com/1223052"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:29:53Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26856"
    },
    {
      "cve": "CVE-2024-26857",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26857"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ngeneve: make sure to pull inner header in geneve_rx()\n\nsyzbot triggered a bug in geneve_rx() [1]\n\nIssue is similar to the one I fixed in commit 8d975c15c0cd\n(\"ip6_tunnel: make sure to pull inner header in __ip6_tnl_rcv()\")\n\nWe have to save skb-\u003enetwork_header in a temporary variable\nin order to be able to recompute the network_header pointer\nafter a pskb_inet_may_pull() call.\n\npskb_inet_may_pull() makes sure the needed headers are in skb-\u003ehead.\n\n[1]\nBUG: KMSAN: uninit-value in IP_ECN_decapsulate include/net/inet_ecn.h:302 [inline]\n BUG: KMSAN: uninit-value in geneve_rx drivers/net/geneve.c:279 [inline]\n BUG: KMSAN: uninit-value in geneve_udp_encap_recv+0x36f9/0x3c10 drivers/net/geneve.c:391\n  IP_ECN_decapsulate include/net/inet_ecn.h:302 [inline]\n  geneve_rx drivers/net/geneve.c:279 [inline]\n  geneve_udp_encap_recv+0x36f9/0x3c10 drivers/net/geneve.c:391\n  udp_queue_rcv_one_skb+0x1d39/0x1f20 net/ipv4/udp.c:2108\n  udp_queue_rcv_skb+0x6ae/0x6e0 net/ipv4/udp.c:2186\n  udp_unicast_rcv_skb+0x184/0x4b0 net/ipv4/udp.c:2346\n  __udp4_lib_rcv+0x1c6b/0x3010 net/ipv4/udp.c:2422\n  udp_rcv+0x7d/0xa0 net/ipv4/udp.c:2604\n  ip_protocol_deliver_rcu+0x264/0x1300 net/ipv4/ip_input.c:205\n  ip_local_deliver_finish+0x2b8/0x440 net/ipv4/ip_input.c:233\n  NF_HOOK include/linux/netfilter.h:314 [inline]\n  ip_local_deliver+0x21f/0x490 net/ipv4/ip_input.c:254\n  dst_input include/net/dst.h:461 [inline]\n  ip_rcv_finish net/ipv4/ip_input.c:449 [inline]\n  NF_HOOK include/linux/netfilter.h:314 [inline]\n  ip_rcv+0x46f/0x760 net/ipv4/ip_input.c:569\n  __netif_receive_skb_one_core net/core/dev.c:5534 [inline]\n  __netif_receive_skb+0x1a6/0x5a0 net/core/dev.c:5648\n  process_backlog+0x480/0x8b0 net/core/dev.c:5976\n  __napi_poll+0xe3/0x980 net/core/dev.c:6576\n  napi_poll net/core/dev.c:6645 [inline]\n  net_rx_action+0x8b8/0x1870 net/core/dev.c:6778\n  __do_softirq+0x1b7/0x7c5 kernel/softirq.c:553\n  do_softirq+0x9a/0xf0 kernel/softirq.c:454\n  __local_bh_enable_ip+0x9b/0xa0 kernel/softirq.c:381\n  local_bh_enable include/linux/bottom_half.h:33 [inline]\n  rcu_read_unlock_bh include/linux/rcupdate.h:820 [inline]\n  __dev_queue_xmit+0x2768/0x51c0 net/core/dev.c:4378\n  dev_queue_xmit include/linux/netdevice.h:3171 [inline]\n  packet_xmit+0x9c/0x6b0 net/packet/af_packet.c:276\n  packet_snd net/packet/af_packet.c:3081 [inline]\n  packet_sendmsg+0x8aef/0x9f10 net/packet/af_packet.c:3113\n  sock_sendmsg_nosec net/socket.c:730 [inline]\n  __sock_sendmsg net/socket.c:745 [inline]\n  __sys_sendto+0x735/0xa10 net/socket.c:2191\n  __do_sys_sendto net/socket.c:2203 [inline]\n  __se_sys_sendto net/socket.c:2199 [inline]\n  __x64_sys_sendto+0x125/0x1c0 net/socket.c:2199\n  do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n  do_syscall_64+0xcf/0x1e0 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x63/0x6b\n\nUninit was created at:\n  slab_post_alloc_hook mm/slub.c:3819 [inline]\n  slab_alloc_node mm/slub.c:3860 [inline]\n  kmem_cache_alloc_node+0x5cb/0xbc0 mm/slub.c:3903\n  kmalloc_reserve+0x13d/0x4a0 net/core/skbuff.c:560\n  __alloc_skb+0x352/0x790 net/core/skbuff.c:651\n  alloc_skb include/linux/skbuff.h:1296 [inline]\n  alloc_skb_with_frags+0xc8/0xbd0 net/core/skbuff.c:6394\n  sock_alloc_send_pskb+0xa80/0xbf0 net/core/sock.c:2783\n  packet_alloc_skb net/packet/af_packet.c:2930 [inline]\n  packet_snd net/packet/af_packet.c:3024 [inline]\n  packet_sendmsg+0x70c2/0x9f10 net/packet/af_packet.c:3113\n  sock_sendmsg_nosec net/socket.c:730 [inline]\n  __sock_sendmsg net/socket.c:745 [inline]\n  __sys_sendto+0x735/0xa10 net/socket.c:2191\n  __do_sys_sendto net/socket.c:2203 [inline]\n  __se_sys_sendto net/socket.c:2199 [inline]\n  __x64_sys_sendto+0x125/0x1c0 net/socket.c:2199\n  do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n  do_syscall_64+0xcf/0x1e0 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x63/0x6b",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26857",
          "url": "https://www.suse.com/security/cve/CVE-2024-26857"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223058 for CVE-2024-26857",
          "url": "https://bugzilla.suse.com/1223058"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:29:53Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26857"
    },
    {
      "cve": "CVE-2024-26861",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26861"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwireguard: receive: annotate data-race around receiving_counter.counter\n\nSyzkaller with KCSAN identified a data-race issue when accessing\nkeypair-\u003ereceiving_counter.counter. Use READ_ONCE() and WRITE_ONCE()\nannotations to mark the data race as intentional.\n\n    BUG: KCSAN: data-race in wg_packet_decrypt_worker / wg_packet_rx_poll\n\n    write to 0xffff888107765888 of 8 bytes by interrupt on cpu 0:\n     counter_validate drivers/net/wireguard/receive.c:321 [inline]\n     wg_packet_rx_poll+0x3ac/0xf00 drivers/net/wireguard/receive.c:461\n     __napi_poll+0x60/0x3b0 net/core/dev.c:6536\n     napi_poll net/core/dev.c:6605 [inline]\n     net_rx_action+0x32b/0x750 net/core/dev.c:6738\n     __do_softirq+0xc4/0x279 kernel/softirq.c:553\n     do_softirq+0x5e/0x90 kernel/softirq.c:454\n     __local_bh_enable_ip+0x64/0x70 kernel/softirq.c:381\n     __raw_spin_unlock_bh include/linux/spinlock_api_smp.h:167 [inline]\n     _raw_spin_unlock_bh+0x36/0x40 kernel/locking/spinlock.c:210\n     spin_unlock_bh include/linux/spinlock.h:396 [inline]\n     ptr_ring_consume_bh include/linux/ptr_ring.h:367 [inline]\n     wg_packet_decrypt_worker+0x6c5/0x700 drivers/net/wireguard/receive.c:499\n     process_one_work kernel/workqueue.c:2633 [inline]\n     ...\n\n    read to 0xffff888107765888 of 8 bytes by task 3196 on cpu 1:\n     decrypt_packet drivers/net/wireguard/receive.c:252 [inline]\n     wg_packet_decrypt_worker+0x220/0x700 drivers/net/wireguard/receive.c:501\n     process_one_work kernel/workqueue.c:2633 [inline]\n     process_scheduled_works+0x5b8/0xa30 kernel/workqueue.c:2706\n     worker_thread+0x525/0x730 kernel/workqueue.c:2787\n     ...",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26861",
          "url": "https://www.suse.com/security/cve/CVE-2024-26861"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223076 for CVE-2024-26861",
          "url": "https://bugzilla.suse.com/1223076"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:29:53Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26861"
    },
    {
      "cve": "CVE-2024-26862",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26862"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\npacket: annotate data-races around ignore_outgoing\n\nignore_outgoing is read locklessly from dev_queue_xmit_nit()\nand packet_getsockopt()\n\nAdd appropriate READ_ONCE()/WRITE_ONCE() annotations.\n\nsyzbot reported:\n\nBUG: KCSAN: data-race in dev_queue_xmit_nit / packet_setsockopt\n\nwrite to 0xffff888107804542 of 1 bytes by task 22618 on cpu 0:\n packet_setsockopt+0xd83/0xfd0 net/packet/af_packet.c:4003\n do_sock_setsockopt net/socket.c:2311 [inline]\n __sys_setsockopt+0x1d8/0x250 net/socket.c:2334\n __do_sys_setsockopt net/socket.c:2343 [inline]\n __se_sys_setsockopt net/socket.c:2340 [inline]\n __x64_sys_setsockopt+0x66/0x80 net/socket.c:2340\n do_syscall_64+0xd3/0x1d0\n entry_SYSCALL_64_after_hwframe+0x6d/0x75\n\nread to 0xffff888107804542 of 1 bytes by task 27 on cpu 1:\n dev_queue_xmit_nit+0x82/0x620 net/core/dev.c:2248\n xmit_one net/core/dev.c:3527 [inline]\n dev_hard_start_xmit+0xcc/0x3f0 net/core/dev.c:3547\n __dev_queue_xmit+0xf24/0x1dd0 net/core/dev.c:4335\n dev_queue_xmit include/linux/netdevice.h:3091 [inline]\n batadv_send_skb_packet+0x264/0x300 net/batman-adv/send.c:108\n batadv_send_broadcast_skb+0x24/0x30 net/batman-adv/send.c:127\n batadv_iv_ogm_send_to_if net/batman-adv/bat_iv_ogm.c:392 [inline]\n batadv_iv_ogm_emit net/batman-adv/bat_iv_ogm.c:420 [inline]\n batadv_iv_send_outstanding_bat_ogm_packet+0x3f0/0x4b0 net/batman-adv/bat_iv_ogm.c:1700\n process_one_work kernel/workqueue.c:3254 [inline]\n process_scheduled_works+0x465/0x990 kernel/workqueue.c:3335\n worker_thread+0x526/0x730 kernel/workqueue.c:3416\n kthread+0x1d1/0x210 kernel/kthread.c:388\n ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:147\n ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:243\n\nvalue changed: 0x00 -\u003e 0x01\n\nReported by Kernel Concurrency Sanitizer on:\nCPU: 1 PID: 27 Comm: kworker/u8:1 Tainted: G        W          6.8.0-syzkaller-08073-g480e035fc4c7 #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/29/2024\nWorkqueue: bat_events batadv_iv_send_outstanding_bat_ogm_packet",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26862",
          "url": "https://www.suse.com/security/cve/CVE-2024-26862"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223111 for CVE-2024-26862",
          "url": "https://bugzilla.suse.com/1223111"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:29:53Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26862"
    },
    {
      "cve": "CVE-2024-26866",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26866"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nspi: lpspi: Avoid potential use-after-free in probe()\n\nfsl_lpspi_probe() is allocating/disposing memory manually with\nspi_alloc_host()/spi_alloc_target(), but uses\ndevm_spi_register_controller(). In case of error after the latter call the\nmemory will be explicitly freed in the probe function by\nspi_controller_put() call, but used afterwards by \"devm\" management outside\nprobe() (spi_unregister_controller() \u003c- devm_spi_unregister() below).\n\nUnable to handle kernel NULL pointer dereference at virtual address 0000000000000070\n...\nCall trace:\n kernfs_find_ns\n kernfs_find_and_get_ns\n sysfs_remove_group\n sysfs_remove_groups\n device_remove_attrs\n device_del\n spi_unregister_controller\n devm_spi_unregister\n release_nodes\n devres_release_all\n really_probe\n driver_probe_device\n __device_attach_driver\n bus_for_each_drv\n __device_attach\n device_initial_probe\n bus_probe_device\n deferred_probe_work_func\n process_one_work\n worker_thread\n kthread\n ret_from_fork",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26866",
          "url": "https://www.suse.com/security/cve/CVE-2024-26866"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223024 for CVE-2024-26866",
          "url": "https://bugzilla.suse.com/1223024"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:29:53Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26866"
    },
    {
      "cve": "CVE-2024-26872",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26872"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/srpt: Do not register event handler until srpt device is fully setup\n\nUpon rare occasions, KASAN reports a use-after-free Write\nin srpt_refresh_port().\n\nThis seems to be because an event handler is registered before the\nsrpt device is fully setup and a race condition upon error may leave a\npartially setup event handler in place.\n\nInstead, only register the event handler after srpt device initialization\nis complete.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26872",
          "url": "https://www.suse.com/security/cve/CVE-2024-26872"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223115 for CVE-2024-26872",
          "url": "https://bugzilla.suse.com/1223115"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:29:53Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26872"
    },
    {
      "cve": "CVE-2024-26875",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26875"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: pvrusb2: fix uaf in pvr2_context_set_notify\n\n[Syzbot reported]\nBUG: KASAN: slab-use-after-free in pvr2_context_set_notify+0x2c4/0x310 drivers/media/usb/pvrusb2/pvrusb2-context.c:35\nRead of size 4 at addr ffff888113aeb0d8 by task kworker/1:1/26\n\nCPU: 1 PID: 26 Comm: kworker/1:1 Not tainted 6.8.0-rc1-syzkaller-00046-gf1a27f081c1f #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024\nWorkqueue: usb_hub_wq hub_event\nCall Trace:\n \u003cTASK\u003e\n __dump_stack lib/dump_stack.c:88 [inline]\n dump_stack_lvl+0xd9/0x1b0 lib/dump_stack.c:106\n print_address_description mm/kasan/report.c:377 [inline]\n print_report+0xc4/0x620 mm/kasan/report.c:488\n kasan_report+0xda/0x110 mm/kasan/report.c:601\n pvr2_context_set_notify+0x2c4/0x310 drivers/media/usb/pvrusb2/pvrusb2-context.c:35\n pvr2_context_notify drivers/media/usb/pvrusb2/pvrusb2-context.c:95 [inline]\n pvr2_context_disconnect+0x94/0xb0 drivers/media/usb/pvrusb2/pvrusb2-context.c:272\n\nFreed by task 906:\nkasan_save_stack+0x33/0x50 mm/kasan/common.c:47\nkasan_save_track+0x14/0x30 mm/kasan/common.c:68\nkasan_save_free_info+0x3f/0x60 mm/kasan/generic.c:640\npoison_slab_object mm/kasan/common.c:241 [inline]\n__kasan_slab_free+0x106/0x1b0 mm/kasan/common.c:257\nkasan_slab_free include/linux/kasan.h:184 [inline]\nslab_free_hook mm/slub.c:2121 [inline]\nslab_free mm/slub.c:4299 [inline]\nkfree+0x105/0x340 mm/slub.c:4409\npvr2_context_check drivers/media/usb/pvrusb2/pvrusb2-context.c:137 [inline]\npvr2_context_thread_func+0x69d/0x960 drivers/media/usb/pvrusb2/pvrusb2-context.c:158\n\n[Analyze]\nTask A set disconnect_flag = !0, which resulted in Task B\u0027s condition being met\nand releasing mp, leading to this issue.\n\n[Fix]\nPlace the disconnect_flag assignment operation after all code in pvr2_context_disconnect()\nto avoid this issue.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26875",
          "url": "https://www.suse.com/security/cve/CVE-2024-26875"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223118 for CVE-2024-26875",
          "url": "https://bugzilla.suse.com/1223118"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:29:53Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26875"
    },
    {
      "cve": "CVE-2024-26876",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26876"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/bridge: adv7511: fix crash on irq during probe\n\nMoved IRQ registration down to end of adv7511_probe().\n\nIf an IRQ already is pending during adv7511_probe\n(before adv7511_cec_init) then cec_received_msg_ts\ncould crash using uninitialized data:\n\n    Unable to handle kernel read from unreadable memory at virtual address 00000000000003d5\n    Internal error: Oops: 96000004 [#1] PREEMPT_RT SMP\n    Call trace:\n     cec_received_msg_ts+0x48/0x990 [cec]\n     adv7511_cec_irq_process+0x1cc/0x308 [adv7511]\n     adv7511_irq_process+0xd8/0x120 [adv7511]\n     adv7511_irq_handler+0x1c/0x30 [adv7511]\n     irq_thread_fn+0x30/0xa0\n     irq_thread+0x14c/0x238\n     kthread+0x190/0x1a8",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26876",
          "url": "https://www.suse.com/security/cve/CVE-2024-26876"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223119 for CVE-2024-26876",
          "url": "https://bugzilla.suse.com/1223119"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:29:53Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26876"
    },
    {
      "cve": "CVE-2024-26877",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26877"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: xilinx - call finalize with bh disabled\n\nWhen calling crypto_finalize_request, BH should be disabled to avoid\ntriggering the following calltrace:\n\n    ------------[ cut here ]------------\n    WARNING: CPU: 2 PID: 74 at crypto/crypto_engine.c:58 crypto_finalize_request+0xa0/0x118\n    Modules linked in: cryptodev(O)\n    CPU: 2 PID: 74 Comm: firmware:zynqmp Tainted: G           O       6.8.0-rc1-yocto-standard #323\n    Hardware name: ZynqMP ZCU102 Rev1.0 (DT)\n    pstate: 40000005 (nZcv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)\n    pc : crypto_finalize_request+0xa0/0x118\n    lr : crypto_finalize_request+0x104/0x118\n    sp : ffffffc085353ce0\n    x29: ffffffc085353ce0 x28: 0000000000000000 x27: ffffff8808ea8688\n    x26: ffffffc081715038 x25: 0000000000000000 x24: ffffff880100db00\n    x23: ffffff880100da80 x22: 0000000000000000 x21: 0000000000000000\n    x20: ffffff8805b14000 x19: ffffff880100da80 x18: 0000000000010450\n    x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000\n    x14: 0000000000000003 x13: 0000000000000000 x12: ffffff880100dad0\n    x11: 0000000000000000 x10: ffffffc0832dcd08 x9 : ffffffc0812416d8\n    x8 : 00000000000001f4 x7 : ffffffc0830d2830 x6 : 0000000000000001\n    x5 : ffffffc082091000 x4 : ffffffc082091658 x3 : 0000000000000000\n    x2 : ffffffc7f9653000 x1 : 0000000000000000 x0 : ffffff8802d20000\n    Call trace:\n     crypto_finalize_request+0xa0/0x118\n     crypto_finalize_aead_request+0x18/0x30\n     zynqmp_handle_aes_req+0xcc/0x388\n     crypto_pump_work+0x168/0x2d8\n     kthread_worker_fn+0xfc/0x3a0\n     kthread+0x118/0x138\n     ret_from_fork+0x10/0x20\n    irq event stamp: 40\n    hardirqs last  enabled at (39): [\u003cffffffc0812416f8\u003e] _raw_spin_unlock_irqrestore+0x70/0xb0\n    hardirqs last disabled at (40): [\u003cffffffc08122d208\u003e] el1_dbg+0x28/0x90\n    softirqs last  enabled at (36): [\u003cffffffc080017dec\u003e] kernel_neon_begin+0x8c/0xf0\n    softirqs last disabled at (34): [\u003cffffffc080017dc0\u003e] kernel_neon_begin+0x60/0xf0\n    ---[ end trace 0000000000000000 ]---",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26877",
          "url": "https://www.suse.com/security/cve/CVE-2024-26877"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223140 for CVE-2024-26877",
          "url": "https://bugzilla.suse.com/1223140"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:29:53Z",
          "details": "low"
        }
      ],
      "title": "CVE-2024-26877"
    },
    {
      "cve": "CVE-2024-26878",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26878"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nquota: Fix potential NULL pointer dereference\n\nBelow race may cause NULL pointer dereference\n\nP1\t\t\t\t\tP2\ndquot_free_inode\t\t\tquota_off\n\t\t\t\t\t  drop_dquot_ref\n\t\t\t\t\t   remove_dquot_ref\n\t\t\t\t\t   dquots = i_dquot(inode)\n  dquots = i_dquot(inode)\n  srcu_read_lock\n  dquots[cnt]) != NULL (1)\n\t\t\t\t\t     dquots[type] = NULL (2)\n  spin_lock(\u0026dquots[cnt]-\u003edq_dqb_lock) (3)\n   ....\n\nIf dquot_free_inode(or other routines) checks inode\u0027s quota pointers (1)\nbefore quota_off sets it to NULL(2) and use it (3) after that, NULL pointer\ndereference will be triggered.\n\nSo let\u0027s fix it by using a temporary pointer to avoid this issue.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26878",
          "url": "https://www.suse.com/security/cve/CVE-2024-26878"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223060 for CVE-2024-26878",
          "url": "https://bugzilla.suse.com/1223060"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:29:53Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26878"
    },
    {
      "cve": "CVE-2024-26879",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26879"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nclk: meson: Add missing clocks to axg_clk_regmaps\n\nSome clocks were missing from axg_clk_regmaps, which caused kernel panic\nduring cat /sys/kernel/debug/clk/clk_summary\n\n[   57.349402] Unable to handle kernel NULL pointer dereference at virtual address 00000000000001fc\n...\n[   57.430002] pstate: 60000005 (nZCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)\n[   57.436900] pc : regmap_read+0x1c/0x88\n[   57.440608] lr : clk_regmap_gate_is_enabled+0x3c/0xb0\n[   57.445611] sp : ffff800082f1b690\n[   57.448888] x29: ffff800082f1b690 x28: 0000000000000000 x27: ffff800080eb9a70\n[   57.455961] x26: 0000000000000007 x25: 0000000000000016 x24: 0000000000000000\n[   57.463033] x23: ffff800080e8b488 x22: 0000000000000015 x21: ffff00000e7e7000\n[   57.470106] x20: ffff00000400ec00 x19: 0000000000000000 x18: ffffffffffffffff\n[   57.477178] x17: 0000000000000000 x16: 0000000000000000 x15: ffff0000042a3000\n[   57.484251] x14: 0000000000000000 x13: ffff0000042a2fec x12: 0000000005f5e100\n[   57.491323] x11: abcc77118461cefd x10: 0000000000000020 x9 : ffff8000805e4b24\n[   57.498396] x8 : ffff0000028063c0 x7 : ffff800082f1b710 x6 : ffff800082f1b710\n[   57.505468] x5 : 00000000ffffffd0 x4 : ffff800082f1b6e0 x3 : 0000000000001000\n[   57.512541] x2 : ffff800082f1b6e4 x1 : 000000000000012c x0 : 0000000000000000\n[   57.519615] Call trace:\n[   57.522030]  regmap_read+0x1c/0x88\n[   57.525393]  clk_regmap_gate_is_enabled+0x3c/0xb0\n[   57.530050]  clk_core_is_enabled+0x44/0x120\n[   57.534190]  clk_summary_show_subtree+0x154/0x2f0\n[   57.538847]  clk_summary_show_subtree+0x220/0x2f0\n[   57.543505]  clk_summary_show_subtree+0x220/0x2f0\n[   57.548162]  clk_summary_show_subtree+0x220/0x2f0\n[   57.552820]  clk_summary_show_subtree+0x220/0x2f0\n[   57.557477]  clk_summary_show_subtree+0x220/0x2f0\n[   57.562135]  clk_summary_show_subtree+0x220/0x2f0\n[   57.566792]  clk_summary_show_subtree+0x220/0x2f0\n[   57.571450]  clk_summary_show+0x84/0xb8\n[   57.575245]  seq_read_iter+0x1bc/0x4b8\n[   57.578954]  seq_read+0x8c/0xd0\n[   57.582059]  full_proxy_read+0x68/0xc8\n[   57.585767]  vfs_read+0xb0/0x268\n[   57.588959]  ksys_read+0x70/0x108\n[   57.592236]  __arm64_sys_read+0x24/0x38\n[   57.596031]  invoke_syscall+0x50/0x128\n[   57.599740]  el0_svc_common.constprop.0+0x48/0xf8\n[   57.604397]  do_el0_svc+0x28/0x40\n[   57.607675]  el0_svc+0x34/0xb8\n[   57.610694]  el0t_64_sync_handler+0x13c/0x158\n[   57.615006]  el0t_64_sync+0x190/0x198\n[   57.618635] Code: a9bd7bfd 910003fd a90153f3 aa0003f3 (b941fc00)\n[   57.624668] ---[ end trace 0000000000000000 ]---\n\n[jbrunet: add missing Fixes tag]",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26879",
          "url": "https://www.suse.com/security/cve/CVE-2024-26879"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223066 for CVE-2024-26879",
          "url": "https://bugzilla.suse.com/1223066"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:29:53Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26879"
    },
    {
      "cve": "CVE-2024-26881",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26881"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: hns3: fix kernel crash when 1588 is received on HIP08 devices\n\nThe HIP08 devices does not register the ptp devices, so the\nhdev-\u003eptp is NULL, but the hardware can receive 1588 messages,\nand set the HNS3_RXD_TS_VLD_B bit, so, if match this case, the\naccess of hdev-\u003eptp-\u003eflags will cause a kernel crash:\n\n[ 5888.946472] Unable to handle kernel NULL pointer dereference at virtual address 0000000000000018\n[ 5888.946475] Unable to handle kernel NULL pointer dereference at virtual address 0000000000000018\n...\n[ 5889.266118] pc : hclge_ptp_get_rx_hwts+0x40/0x170 [hclge]\n[ 5889.272612] lr : hclge_ptp_get_rx_hwts+0x34/0x170 [hclge]\n[ 5889.279101] sp : ffff800012c3bc50\n[ 5889.283516] x29: ffff800012c3bc50 x28: ffff2040002be040\n[ 5889.289927] x27: ffff800009116484 x26: 0000000080007500\n[ 5889.296333] x25: 0000000000000000 x24: ffff204001c6f000\n[ 5889.302738] x23: ffff204144f53c00 x22: 0000000000000000\n[ 5889.309134] x21: 0000000000000000 x20: ffff204004220080\n[ 5889.315520] x19: ffff204144f53c00 x18: 0000000000000000\n[ 5889.321897] x17: 0000000000000000 x16: 0000000000000000\n[ 5889.328263] x15: 0000004000140ec8 x14: 0000000000000000\n[ 5889.334617] x13: 0000000000000000 x12: 00000000010011df\n[ 5889.340965] x11: bbfeff4d22000000 x10: 0000000000000000\n[ 5889.347303] x9 : ffff800009402124 x8 : 0200f78811dfbb4d\n[ 5889.353637] x7 : 2200000000191b01 x6 : ffff208002a7d480\n[ 5889.359959] x5 : 0000000000000000 x4 : 0000000000000000\n[ 5889.366271] x3 : 0000000000000000 x2 : 0000000000000000\n[ 5889.372567] x1 : 0000000000000000 x0 : ffff20400095c080\n[ 5889.378857] Call trace:\n[ 5889.382285] hclge_ptp_get_rx_hwts+0x40/0x170 [hclge]\n[ 5889.388304] hns3_handle_bdinfo+0x324/0x410 [hns3]\n[ 5889.394055] hns3_handle_rx_bd+0x60/0x150 [hns3]\n[ 5889.399624] hns3_clean_rx_ring+0x84/0x170 [hns3]\n[ 5889.405270] hns3_nic_common_poll+0xa8/0x220 [hns3]\n[ 5889.411084] napi_poll+0xcc/0x264\n[ 5889.415329] net_rx_action+0xd4/0x21c\n[ 5889.419911] __do_softirq+0x130/0x358\n[ 5889.424484] irq_exit+0x134/0x154\n[ 5889.428700] __handle_domain_irq+0x88/0xf0\n[ 5889.433684] gic_handle_irq+0x78/0x2c0\n[ 5889.438319] el1_irq+0xb8/0x140\n[ 5889.442354] arch_cpu_idle+0x18/0x40\n[ 5889.446816] default_idle_call+0x5c/0x1c0\n[ 5889.451714] cpuidle_idle_call+0x174/0x1b0\n[ 5889.456692] do_idle+0xc8/0x160\n[ 5889.460717] cpu_startup_entry+0x30/0xfc\n[ 5889.465523] secondary_start_kernel+0x158/0x1ec\n[ 5889.470936] Code: 97ffab78 f9411c14 91408294 f9457284 (f9400c80)\n[ 5889.477950] SMP: stopping secondary CPUs\n[ 5890.514626] SMP: failed to stop secondary CPUs 0-69,71-95\n[ 5890.522951] Starting crashdump kernel...",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26881",
          "url": "https://www.suse.com/security/cve/CVE-2024-26881"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223041 for CVE-2024-26881",
          "url": "https://bugzilla.suse.com/1223041"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:29:53Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26881"
    },
    {
      "cve": "CVE-2024-26882",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26882"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: ip_tunnel: make sure to pull inner header in ip_tunnel_rcv()\n\nApply the same fix than ones found in :\n\n8d975c15c0cd (\"ip6_tunnel: make sure to pull inner header in __ip6_tnl_rcv()\")\n1ca1ba465e55 (\"geneve: make sure to pull inner header in geneve_rx()\")\n\nWe have to save skb-\u003enetwork_header in a temporary variable\nin order to be able to recompute the network_header pointer\nafter a pskb_inet_may_pull() call.\n\npskb_inet_may_pull() makes sure the needed headers are in skb-\u003ehead.\n\nsyzbot reported:\nBUG: KMSAN: uninit-value in __INET_ECN_decapsulate include/net/inet_ecn.h:253 [inline]\n BUG: KMSAN: uninit-value in INET_ECN_decapsulate include/net/inet_ecn.h:275 [inline]\n BUG: KMSAN: uninit-value in IP_ECN_decapsulate include/net/inet_ecn.h:302 [inline]\n BUG: KMSAN: uninit-value in ip_tunnel_rcv+0xed9/0x2ed0 net/ipv4/ip_tunnel.c:409\n  __INET_ECN_decapsulate include/net/inet_ecn.h:253 [inline]\n  INET_ECN_decapsulate include/net/inet_ecn.h:275 [inline]\n  IP_ECN_decapsulate include/net/inet_ecn.h:302 [inline]\n  ip_tunnel_rcv+0xed9/0x2ed0 net/ipv4/ip_tunnel.c:409\n  __ipgre_rcv+0x9bc/0xbc0 net/ipv4/ip_gre.c:389\n  ipgre_rcv net/ipv4/ip_gre.c:411 [inline]\n  gre_rcv+0x423/0x19f0 net/ipv4/ip_gre.c:447\n  gre_rcv+0x2a4/0x390 net/ipv4/gre_demux.c:163\n  ip_protocol_deliver_rcu+0x264/0x1300 net/ipv4/ip_input.c:205\n  ip_local_deliver_finish+0x2b8/0x440 net/ipv4/ip_input.c:233\n  NF_HOOK include/linux/netfilter.h:314 [inline]\n  ip_local_deliver+0x21f/0x490 net/ipv4/ip_input.c:254\n  dst_input include/net/dst.h:461 [inline]\n  ip_rcv_finish net/ipv4/ip_input.c:449 [inline]\n  NF_HOOK include/linux/netfilter.h:314 [inline]\n  ip_rcv+0x46f/0x760 net/ipv4/ip_input.c:569\n  __netif_receive_skb_one_core net/core/dev.c:5534 [inline]\n  __netif_receive_skb+0x1a6/0x5a0 net/core/dev.c:5648\n  netif_receive_skb_internal net/core/dev.c:5734 [inline]\n  netif_receive_skb+0x58/0x660 net/core/dev.c:5793\n  tun_rx_batched+0x3ee/0x980 drivers/net/tun.c:1556\n  tun_get_user+0x53b9/0x66e0 drivers/net/tun.c:2009\n  tun_chr_write_iter+0x3af/0x5d0 drivers/net/tun.c:2055\n  call_write_iter include/linux/fs.h:2087 [inline]\n  new_sync_write fs/read_write.c:497 [inline]\n  vfs_write+0xb6b/0x1520 fs/read_write.c:590\n  ksys_write+0x20f/0x4c0 fs/read_write.c:643\n  __do_sys_write fs/read_write.c:655 [inline]\n  __se_sys_write fs/read_write.c:652 [inline]\n  __x64_sys_write+0x93/0xd0 fs/read_write.c:652\n  do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n  do_syscall_64+0xcf/0x1e0 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x63/0x6b\n\nUninit was created at:\n  __alloc_pages+0x9a6/0xe00 mm/page_alloc.c:4590\n  alloc_pages_mpol+0x62b/0x9d0 mm/mempolicy.c:2133\n  alloc_pages+0x1be/0x1e0 mm/mempolicy.c:2204\n  skb_page_frag_refill+0x2bf/0x7c0 net/core/sock.c:2909\n  tun_build_skb drivers/net/tun.c:1686 [inline]\n  tun_get_user+0xe0a/0x66e0 drivers/net/tun.c:1826\n  tun_chr_write_iter+0x3af/0x5d0 drivers/net/tun.c:2055\n  call_write_iter include/linux/fs.h:2087 [inline]\n  new_sync_write fs/read_write.c:497 [inline]\n  vfs_write+0xb6b/0x1520 fs/read_write.c:590\n  ksys_write+0x20f/0x4c0 fs/read_write.c:643\n  __do_sys_write fs/read_write.c:655 [inline]\n  __se_sys_write fs/read_write.c:652 [inline]\n  __x64_sys_write+0x93/0xd0 fs/read_write.c:652\n  do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n  do_syscall_64+0xcf/0x1e0 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x63/0x6b",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26882",
          "url": "https://www.suse.com/security/cve/CVE-2024-26882"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223034 for CVE-2024-26882",
          "url": "https://bugzilla.suse.com/1223034"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:29:53Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26882"
    },
    {
      "cve": "CVE-2024-26883",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26883"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Fix stackmap overflow check on 32-bit arches\n\nThe stackmap code relies on roundup_pow_of_two() to compute the number\nof hash buckets, and contains an overflow check by checking if the\nresulting value is 0. However, on 32-bit arches, the roundup code itself\ncan overflow by doing a 32-bit left-shift of an unsigned long value,\nwhich is undefined behaviour, so it is not guaranteed to truncate\nneatly. This was triggered by syzbot on the DEVMAP_HASH type, which\ncontains the same check, copied from the hashtab code.\n\nThe commit in the fixes tag actually attempted to fix this, but the fix\ndid not account for the UB, so the fix only works on CPUs where an\noverflow does result in a neat truncation to zero, which is not\nguaranteed. Checking the value before rounding does not have this\nproblem.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26883",
          "url": "https://www.suse.com/security/cve/CVE-2024-26883"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223035 for CVE-2024-26883",
          "url": "https://bugzilla.suse.com/1223035"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:29:53Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26883"
    },
    {
      "cve": "CVE-2024-26884",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26884"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Fix hashtab overflow check on 32-bit arches\n\nThe hashtab code relies on roundup_pow_of_two() to compute the number of\nhash buckets, and contains an overflow check by checking if the\nresulting value is 0. However, on 32-bit arches, the roundup code itself\ncan overflow by doing a 32-bit left-shift of an unsigned long value,\nwhich is undefined behaviour, so it is not guaranteed to truncate\nneatly. This was triggered by syzbot on the DEVMAP_HASH type, which\ncontains the same check, copied from the hashtab code. So apply the same\nfix to hashtab, by moving the overflow check to before the roundup.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26884",
          "url": "https://www.suse.com/security/cve/CVE-2024-26884"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223189 for CVE-2024-26884",
          "url": "https://bugzilla.suse.com/1223189"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:29:53Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26884"
    },
    {
      "cve": "CVE-2024-26885",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26885"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Fix DEVMAP_HASH overflow check on 32-bit arches\n\nThe devmap code allocates a number hash buckets equal to the next power\nof two of the max_entries value provided when creating the map. When\nrounding up to the next power of two, the 32-bit variable storing the\nnumber of buckets can overflow, and the code checks for overflow by\nchecking if the truncated 32-bit value is equal to 0. However, on 32-bit\narches the rounding up itself can overflow mid-way through, because it\nends up doing a left-shift of 32 bits on an unsigned long value. If the\nsize of an unsigned long is four bytes, this is undefined behaviour, so\nthere is no guarantee that we\u0027ll end up with a nice and tidy 0-value at\nthe end.\n\nSyzbot managed to turn this into a crash on arm32 by creating a\nDEVMAP_HASH with max_entries \u003e 0x80000000 and then trying to update it.\nFix this by moving the overflow check to before the rounding up\noperation.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26885",
          "url": "https://www.suse.com/security/cve/CVE-2024-26885"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223190 for CVE-2024-26885",
          "url": "https://bugzilla.suse.com/1223190"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:29:53Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26885"
    },
    {
      "cve": "CVE-2024-26891",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26891"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\niommu/vt-d: Don\u0027t issue ATS Invalidation request when device is disconnected\n\nFor those endpoint devices connect to system via hotplug capable ports,\nusers could request a hot reset to the device by flapping device\u0027s link\nthrough setting the slot\u0027s link control register, as pciehp_ist() DLLSC\ninterrupt sequence response, pciehp will unload the device driver and\nthen power it off. thus cause an IOMMU device-TLB invalidation (Intel\nVT-d spec, or ATS Invalidation in PCIe spec r6.1) request for non-existence\ntarget device to be sent and deadly loop to retry that request after ITE\nfault triggered in interrupt context.\n\nThat would cause following continuous hard lockup warning and system hang\n\n[ 4211.433662] pcieport 0000:17:01.0: pciehp: Slot(108): Link Down\n[ 4211.433664] pcieport 0000:17:01.0: pciehp: Slot(108): Card not present\n[ 4223.822591] NMI watchdog: Watchdog detected hard LOCKUP on cpu 144\n[ 4223.822622] CPU: 144 PID: 1422 Comm: irq/57-pciehp Kdump: loaded Tainted: G S\n         OE    kernel version xxxx\n[ 4223.822623] Hardware name: vendorname xxxx 666-106,\nBIOS 01.01.02.03.01 05/15/2023\n[ 4223.822623] RIP: 0010:qi_submit_sync+0x2c0/0x490\n[ 4223.822624] Code: 48 be 00 00 00 00 00 08 00 00 49 85 74 24 20 0f 95 c1 48 8b\n 57 10 83 c1 04 83 3c 1a 03 0f 84 a2 01 00 00 49 8b 04 24 8b 70 34 \u003c40\u003e f6 c6 1\n0 74 17 49 8b 04 24 8b 80 80 00 00 00 89 c2 d3 fa 41 39\n[ 4223.822624] RSP: 0018:ffffc4f074f0bbb8 EFLAGS: 00000093\n[ 4223.822625] RAX: ffffc4f040059000 RBX: 0000000000000014 RCX: 0000000000000005\n[ 4223.822625] RDX: ffff9f3841315800 RSI: 0000000000000000 RDI: ffff9f38401a8340\n[ 4223.822625] RBP: ffff9f38401a8340 R08: ffffc4f074f0bc00 R09: 0000000000000000\n[ 4223.822626] R10: 0000000000000010 R11: 0000000000000018 R12: ffff9f384005e200\n[ 4223.822626] R13: 0000000000000004 R14: 0000000000000046 R15: 0000000000000004\n[ 4223.822626] FS:  0000000000000000(0000) GS:ffffa237ae400000(0000)\nknlGS:0000000000000000\n[ 4223.822627] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[ 4223.822627] CR2: 00007ffe86515d80 CR3: 000002fd3000a001 CR4: 0000000000770ee0\n[ 4223.822627] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n[ 4223.822628] DR3: 0000000000000000 DR6: 00000000fffe07f0 DR7: 0000000000000400\n[ 4223.822628] PKRU: 55555554\n[ 4223.822628] Call Trace:\n[ 4223.822628]  qi_flush_dev_iotlb+0xb1/0xd0\n[ 4223.822628]  __dmar_remove_one_dev_info+0x224/0x250\n[ 4223.822629]  dmar_remove_one_dev_info+0x3e/0x50\n[ 4223.822629]  intel_iommu_release_device+0x1f/0x30\n[ 4223.822629]  iommu_release_device+0x33/0x60\n[ 4223.822629]  iommu_bus_notifier+0x7f/0x90\n[ 4223.822630]  blocking_notifier_call_chain+0x60/0x90\n[ 4223.822630]  device_del+0x2e5/0x420\n[ 4223.822630]  pci_remove_bus_device+0x70/0x110\n[ 4223.822630]  pciehp_unconfigure_device+0x7c/0x130\n[ 4223.822631]  pciehp_disable_slot+0x6b/0x100\n[ 4223.822631]  pciehp_handle_presence_or_link_change+0xd8/0x320\n[ 4223.822631]  pciehp_ist+0x176/0x180\n[ 4223.822631]  ? irq_finalize_oneshot.part.50+0x110/0x110\n[ 4223.822632]  irq_thread_fn+0x19/0x50\n[ 4223.822632]  irq_thread+0x104/0x190\n[ 4223.822632]  ? irq_forced_thread_fn+0x90/0x90\n[ 4223.822632]  ? irq_thread_check_affinity+0xe0/0xe0\n[ 4223.822633]  kthread+0x114/0x130\n[ 4223.822633]  ? __kthread_cancel_work+0x40/0x40\n[ 4223.822633]  ret_from_fork+0x1f/0x30\n[ 4223.822633] Kernel panic - not syncing: Hard LOCKUP\n[ 4223.822634] CPU: 144 PID: 1422 Comm: irq/57-pciehp Kdump: loaded Tainted: G S\n         OE     kernel version xxxx\n[ 4223.822634] Hardware name: vendorname xxxx 666-106,\nBIOS 01.01.02.03.01 05/15/2023\n[ 4223.822634] Call Trace:\n[ 4223.822634]  \u003cNMI\u003e\n[ 4223.822635]  dump_stack+0x6d/0x88\n[ 4223.822635]  panic+0x101/0x2d0\n[ 4223.822635]  ? ret_from_fork+0x11/0x30\n[ 4223.822635]  nmi_panic.cold.14+0xc/0xc\n[ 4223.822636]  watchdog_overflow_callback.cold.8+0x6d/0x81\n[ 4223.822636]  __perf_event_overflow+0x4f/0xf0\n[ 4223.822636]  handle_pmi_common\n---truncated---",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26891",
          "url": "https://www.suse.com/security/cve/CVE-2024-26891"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223037 for CVE-2024-26891",
          "url": "https://bugzilla.suse.com/1223037"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:29:53Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26891"
    },
    {
      "cve": "CVE-2024-26893",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26893"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfirmware: arm_scmi: Fix double free in SMC transport cleanup path\n\nWhen the generic SCMI code tears down a channel, it calls the chan_free\ncallback function, defined by each transport. Since multiple protocols\nmight share the same transport_info member, chan_free() might want to\nclean up the same member multiple times within the given SCMI transport\nimplementation. In this case, it is SMC transport. This will lead to a NULL\npointer dereference at the second time:\n\n    | scmi_protocol scmi_dev.1: Enabled polling mode TX channel - prot_id:16\n    | arm-scmi firmware:scmi: SCMI Notifications - Core Enabled.\n    | arm-scmi firmware:scmi: unable to communicate with SCMI\n    | Unable to handle kernel NULL pointer dereference at virtual address 0000000000000000\n    | Mem abort info:\n    |   ESR = 0x0000000096000004\n    |   EC = 0x25: DABT (current EL), IL = 32 bits\n    |   SET = 0, FnV = 0\n    |   EA = 0, S1PTW = 0\n    |   FSC = 0x04: level 0 translation fault\n    | Data abort info:\n    |   ISV = 0, ISS = 0x00000004, ISS2 = 0x00000000\n    |   CM = 0, WnR = 0, TnD = 0, TagAccess = 0\n    |   GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0\n    | user pgtable: 4k pages, 48-bit VAs, pgdp=0000000881ef8000\n    | [0000000000000000] pgd=0000000000000000, p4d=0000000000000000\n    | Internal error: Oops: 0000000096000004 [#1] PREEMPT SMP\n    | Modules linked in:\n    | CPU: 4 PID: 1 Comm: swapper/0 Not tainted 6.7.0-rc2-00124-g455ef3d016c9-dirty #793\n    | Hardware name: FVP Base RevC (DT)\n    | pstate: 61400009 (nZCv daif +PAN -UAO -TCO +DIT -SSBS BTYPE=--)\n    | pc : smc_chan_free+0x3c/0x6c\n    | lr : smc_chan_free+0x3c/0x6c\n    | Call trace:\n    |  smc_chan_free+0x3c/0x6c\n    |  idr_for_each+0x68/0xf8\n    |  scmi_cleanup_channels.isra.0+0x2c/0x58\n    |  scmi_probe+0x434/0x734\n    |  platform_probe+0x68/0xd8\n    |  really_probe+0x110/0x27c\n    |  __driver_probe_device+0x78/0x12c\n    |  driver_probe_device+0x3c/0x118\n    |  __driver_attach+0x74/0x128\n    |  bus_for_each_dev+0x78/0xe0\n    |  driver_attach+0x24/0x30\n    |  bus_add_driver+0xe4/0x1e8\n    |  driver_register+0x60/0x128\n    |  __platform_driver_register+0x28/0x34\n    |  scmi_driver_init+0x84/0xc0\n    |  do_one_initcall+0x78/0x33c\n    |  kernel_init_freeable+0x2b8/0x51c\n    |  kernel_init+0x24/0x130\n    |  ret_from_fork+0x10/0x20\n    | Code: f0004701 910a0021 aa1403e5 97b91c70 (b9400280)\n    | ---[ end trace 0000000000000000 ]---\n\nSimply check for the struct pointer being NULL before trying to access\nits members, to avoid this situation.\n\nThis was found when a transport doesn\u0027t really work (for instance no SMC\nservice), the probe routines then tries to clean up, and triggers a crash.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26893",
          "url": "https://www.suse.com/security/cve/CVE-2024-26893"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223196 for CVE-2024-26893",
          "url": "https://bugzilla.suse.com/1223196"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:29:53Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26893"
    },
    {
      "cve": "CVE-2024-26895",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26895"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: wilc1000: prevent use-after-free on vif when cleaning up all interfaces\n\nwilc_netdev_cleanup currently triggers a KASAN warning, which can be\nobserved on interface registration error path, or simply by\nremoving the module/unbinding device from driver:\n\necho spi0.1 \u003e /sys/bus/spi/drivers/wilc1000_spi/unbind\n\n==================================================================\nBUG: KASAN: slab-use-after-free in wilc_netdev_cleanup+0x508/0x5cc\nRead of size 4 at addr c54d1ce8 by task sh/86\n\nCPU: 0 PID: 86 Comm: sh Not tainted 6.8.0-rc1+ #117\nHardware name: Atmel SAMA5\n unwind_backtrace from show_stack+0x18/0x1c\n show_stack from dump_stack_lvl+0x34/0x58\n dump_stack_lvl from print_report+0x154/0x500\n print_report from kasan_report+0xac/0xd8\n kasan_report from wilc_netdev_cleanup+0x508/0x5cc\n wilc_netdev_cleanup from wilc_bus_remove+0xc8/0xec\n wilc_bus_remove from spi_remove+0x8c/0xac\n spi_remove from device_release_driver_internal+0x434/0x5f8\n device_release_driver_internal from unbind_store+0xbc/0x108\n unbind_store from kernfs_fop_write_iter+0x398/0x584\n kernfs_fop_write_iter from vfs_write+0x728/0xf88\n vfs_write from ksys_write+0x110/0x1e4\n ksys_write from ret_fast_syscall+0x0/0x1c\n\n[...]\n\nAllocated by task 1:\n kasan_save_track+0x30/0x5c\n __kasan_kmalloc+0x8c/0x94\n __kmalloc_node+0x1cc/0x3e4\n kvmalloc_node+0x48/0x180\n alloc_netdev_mqs+0x68/0x11dc\n alloc_etherdev_mqs+0x28/0x34\n wilc_netdev_ifc_init+0x34/0x8ec\n wilc_cfg80211_init+0x690/0x910\n wilc_bus_probe+0xe0/0x4a0\n spi_probe+0x158/0x1b0\n really_probe+0x270/0xdf4\n __driver_probe_device+0x1dc/0x580\n driver_probe_device+0x60/0x140\n __driver_attach+0x228/0x5d4\n bus_for_each_dev+0x13c/0x1a8\n bus_add_driver+0x2a0/0x608\n driver_register+0x24c/0x578\n do_one_initcall+0x180/0x310\n kernel_init_freeable+0x424/0x484\n kernel_init+0x20/0x148\n ret_from_fork+0x14/0x28\n\nFreed by task 86:\n kasan_save_track+0x30/0x5c\n kasan_save_free_info+0x38/0x58\n __kasan_slab_free+0xe4/0x140\n kfree+0xb0/0x238\n device_release+0xc0/0x2a8\n kobject_put+0x1d4/0x46c\n netdev_run_todo+0x8fc/0x11d0\n wilc_netdev_cleanup+0x1e4/0x5cc\n wilc_bus_remove+0xc8/0xec\n spi_remove+0x8c/0xac\n device_release_driver_internal+0x434/0x5f8\n unbind_store+0xbc/0x108\n kernfs_fop_write_iter+0x398/0x584\n vfs_write+0x728/0xf88\n ksys_write+0x110/0x1e4\n ret_fast_syscall+0x0/0x1c\n [...]\n\nDavid Mosberger-Tan initial investigation [1] showed that this\nuse-after-free is due to netdevice unregistration during vif list\ntraversal. When unregistering a net device, since the needs_free_netdev has\nbeen set to true during registration, the netdevice object is also freed,\nand as a consequence, the corresponding vif object too, since it is\nattached to it as private netdevice data. The next occurrence of the loop\nthen tries to access freed vif pointer to the list to move forward in the\nlist.\n\nFix this use-after-free thanks to two mechanisms:\n- navigate in the list with list_for_each_entry_safe, which allows to\n  safely modify the list as we go through each element. For each element,\n  remove it from the list with list_del_rcu\n- make sure to wait for RCU grace period end after each vif removal to make\n  sure it is safe to free the corresponding vif too (through\n  unregister_netdev)\n\nSince we are in a RCU \"modifier\" path (not a \"reader\" path), and because\nsuch path is expected not to be concurrent to any other modifier (we are\nusing the vif_mutex lock), we do not need to use RCU list API, that\u0027s why\nwe can benefit from list_for_each_entry_safe.\n\n[1] https://lore.kernel.org/linux-wireless/ab077dbe58b1ea5de0a3b2ca21f275a07af967d2.camel@egauge.net/",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26895",
          "url": "https://www.suse.com/security/cve/CVE-2024-26895"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223197 for CVE-2024-26895",
          "url": "https://bugzilla.suse.com/1223197"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:29:53Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26895"
    },
    {
      "cve": "CVE-2024-26896",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26896"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: wfx: fix memory leak when starting AP\n\nKmemleak reported this error:\n\n    unreferenced object 0xd73d1180 (size 184):\n      comm \"wpa_supplicant\", pid 1559, jiffies 13006305 (age 964.245s)\n      hex dump (first 32 bytes):\n        00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................\n        00 00 00 00 00 00 00 00 1e 00 01 00 00 00 00 00  ................\n      backtrace:\n        [\u003c5ca11420\u003e] kmem_cache_alloc+0x20c/0x5ac\n        [\u003c127bdd74\u003e] __alloc_skb+0x144/0x170\n        [\u003cfb8a5e38\u003e] __netdev_alloc_skb+0x50/0x180\n        [\u003c0f9fa1d5\u003e] __ieee80211_beacon_get+0x290/0x4d4 [mac80211]\n        [\u003c7accd02d\u003e] ieee80211_beacon_get_tim+0x54/0x18c [mac80211]\n        [\u003c41e25cc3\u003e] wfx_start_ap+0xc8/0x234 [wfx]\n        [\u003c93a70356\u003e] ieee80211_start_ap+0x404/0x6b4 [mac80211]\n        [\u003ca4a661cd\u003e] nl80211_start_ap+0x76c/0x9e0 [cfg80211]\n        [\u003c47bd8b68\u003e] genl_rcv_msg+0x198/0x378\n        [\u003c453ef796\u003e] netlink_rcv_skb+0xd0/0x130\n        [\u003c6b7c977a\u003e] genl_rcv+0x34/0x44\n        [\u003c66b2d04d\u003e] netlink_unicast+0x1b4/0x258\n        [\u003cf965b9b6\u003e] netlink_sendmsg+0x1e8/0x428\n        [\u003caadb8231\u003e] ____sys_sendmsg+0x1e0/0x274\n        [\u003cd2b5212d\u003e] ___sys_sendmsg+0x80/0xb4\n        [\u003c69954f45\u003e] __sys_sendmsg+0x64/0xa8\n    unreferenced object 0xce087000 (size 1024):\n      comm \"wpa_supplicant\", pid 1559, jiffies 13006305 (age 964.246s)\n      hex dump (first 32 bytes):\n        00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................\n        10 00 07 40 00 00 00 00 00 00 00 00 00 00 00 00  ...@............\n      backtrace:\n        [\u003c9a993714\u003e] __kmalloc_track_caller+0x230/0x600\n        [\u003cf83ea192\u003e] kmalloc_reserve.constprop.0+0x30/0x74\n        [\u003ca2c61343\u003e] __alloc_skb+0xa0/0x170\n        [\u003cfb8a5e38\u003e] __netdev_alloc_skb+0x50/0x180\n        [\u003c0f9fa1d5\u003e] __ieee80211_beacon_get+0x290/0x4d4 [mac80211]\n        [\u003c7accd02d\u003e] ieee80211_beacon_get_tim+0x54/0x18c [mac80211]\n        [\u003c41e25cc3\u003e] wfx_start_ap+0xc8/0x234 [wfx]\n        [\u003c93a70356\u003e] ieee80211_start_ap+0x404/0x6b4 [mac80211]\n        [\u003ca4a661cd\u003e] nl80211_start_ap+0x76c/0x9e0 [cfg80211]\n        [\u003c47bd8b68\u003e] genl_rcv_msg+0x198/0x378\n        [\u003c453ef796\u003e] netlink_rcv_skb+0xd0/0x130\n        [\u003c6b7c977a\u003e] genl_rcv+0x34/0x44\n        [\u003c66b2d04d\u003e] netlink_unicast+0x1b4/0x258\n        [\u003cf965b9b6\u003e] netlink_sendmsg+0x1e8/0x428\n        [\u003caadb8231\u003e] ____sys_sendmsg+0x1e0/0x274\n        [\u003cd2b5212d\u003e] ___sys_sendmsg+0x80/0xb4\n\nHowever, since the kernel is build optimized, it seems the stack is not\naccurate. It appears the issue is related to wfx_set_mfp_ap(). The issue\nis obvious in this function: memory allocated by ieee80211_beacon_get()\nis never released. Fixing this leak makes kmemleak happy.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26896",
          "url": "https://www.suse.com/security/cve/CVE-2024-26896"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223042 for CVE-2024-26896",
          "url": "https://bugzilla.suse.com/1223042"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:29:53Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26896"
    },
    {
      "cve": "CVE-2024-26897",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26897"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: ath9k: delay all of ath9k_wmi_event_tasklet() until init is complete\n\nThe ath9k_wmi_event_tasklet() used in ath9k_htc assumes that all the data\nstructures have been fully initialised by the time it runs. However, because of\nthe order in which things are initialised, this is not guaranteed to be the\ncase, because the device is exposed to the USB subsystem before the ath9k driver\ninitialisation is completed.\n\nWe already committed a partial fix for this in commit:\n8b3046abc99e (\"ath9k_htc: fix NULL pointer dereference at ath9k_htc_tx_get_packet()\")\n\nHowever, that commit only aborted the WMI_TXSTATUS_EVENTID command in the event\ntasklet, pairing it with an \"initialisation complete\" bit in the TX struct. It\nseems syzbot managed to trigger the race for one of the other commands as well,\nso let\u0027s just move the existing synchronisation bit to cover the whole\ntasklet (setting it at the end of ath9k_htc_probe_device() instead of inside\nath9k_tx_init()).",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26897",
          "url": "https://www.suse.com/security/cve/CVE-2024-26897"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223323 for CVE-2024-26897",
          "url": "https://bugzilla.suse.com/1223323"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:29:53Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26897"
    },
    {
      "cve": "CVE-2024-26898",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26898"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\naoe: fix the potential use-after-free problem in aoecmd_cfg_pkts\n\nThis patch is against CVE-2023-6270. The description of cve is:\n\n  A flaw was found in the ATA over Ethernet (AoE) driver in the Linux\n  kernel. The aoecmd_cfg_pkts() function improperly updates the refcnt on\n  `struct net_device`, and a use-after-free can be triggered by racing\n  between the free on the struct and the access through the `skbtxq`\n  global queue. This could lead to a denial of service condition or\n  potential code execution.\n\nIn aoecmd_cfg_pkts(), it always calls dev_put(ifp) when skb initial\ncode is finished. But the net_device ifp will still be used in\nlater tx()-\u003edev_queue_xmit() in kthread. Which means that the\ndev_put(ifp) should NOT be called in the success path of skb\ninitial code in aoecmd_cfg_pkts(). Otherwise tx() may run into\nuse-after-free because the net_device is freed.\n\nThis patch removed the dev_put(ifp) in the success path in\naoecmd_cfg_pkts(), and added dev_put() after skb xmit in tx().",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26898",
          "url": "https://www.suse.com/security/cve/CVE-2024-26898"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1218562 for CVE-2024-26898",
          "url": "https://bugzilla.suse.com/1218562"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223016 for CVE-2024-26898",
          "url": "https://bugzilla.suse.com/1223016"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223017 for CVE-2024-26898",
          "url": "https://bugzilla.suse.com/1223017"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:29:53Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26898"
    },
    {
      "cve": "CVE-2024-26901",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26901"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndo_sys_name_to_handle(): use kzalloc() to fix kernel-infoleak\n\nsyzbot identified a kernel information leak vulnerability in\ndo_sys_name_to_handle() and issued the following report [1].\n\n[1]\n\"BUG: KMSAN: kernel-infoleak in instrument_copy_to_user include/linux/instrumented.h:114 [inline]\nBUG: KMSAN: kernel-infoleak in _copy_to_user+0xbc/0x100 lib/usercopy.c:40\n instrument_copy_to_user include/linux/instrumented.h:114 [inline]\n _copy_to_user+0xbc/0x100 lib/usercopy.c:40\n copy_to_user include/linux/uaccess.h:191 [inline]\n do_sys_name_to_handle fs/fhandle.c:73 [inline]\n __do_sys_name_to_handle_at fs/fhandle.c:112 [inline]\n __se_sys_name_to_handle_at+0x949/0xb10 fs/fhandle.c:94\n __x64_sys_name_to_handle_at+0xe4/0x140 fs/fhandle.c:94\n ...\n\nUninit was created at:\n slab_post_alloc_hook+0x129/0xa70 mm/slab.h:768\n slab_alloc_node mm/slub.c:3478 [inline]\n __kmem_cache_alloc_node+0x5c9/0x970 mm/slub.c:3517\n __do_kmalloc_node mm/slab_common.c:1006 [inline]\n __kmalloc+0x121/0x3c0 mm/slab_common.c:1020\n kmalloc include/linux/slab.h:604 [inline]\n do_sys_name_to_handle fs/fhandle.c:39 [inline]\n __do_sys_name_to_handle_at fs/fhandle.c:112 [inline]\n __se_sys_name_to_handle_at+0x441/0xb10 fs/fhandle.c:94\n __x64_sys_name_to_handle_at+0xe4/0x140 fs/fhandle.c:94\n ...\n\nBytes 18-19 of 20 are uninitialized\nMemory access of size 20 starts at ffff888128a46380\nData copied to user address 0000000020000240\"\n\nPer Chuck Lever\u0027s suggestion, use kzalloc() instead of kmalloc() to\nsolve the problem.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26901",
          "url": "https://www.suse.com/security/cve/CVE-2024-26901"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223198 for CVE-2024-26901",
          "url": "https://bugzilla.suse.com/1223198"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:29:53Z",
          "details": "low"
        }
      ],
      "title": "CVE-2024-26901"
    },
    {
      "cve": "CVE-2024-26903",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26903"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: rfcomm: Fix null-ptr-deref in rfcomm_check_security\n\nDuring our fuzz testing of the connection and disconnection process at the\nRFCOMM layer, we discovered this bug. By comparing the packets from a\nnormal connection and disconnection process with the testcase that\ntriggered a KASAN report. We analyzed the cause of this bug as follows:\n\n1. In the packets captured during a normal connection, the host sends a\n`Read Encryption Key Size` type of `HCI_CMD` packet\n(Command Opcode: 0x1408) to the controller to inquire the length of\nencryption key.After receiving this packet, the controller immediately\nreplies with a Command Completepacket (Event Code: 0x0e) to return the\nEncryption Key Size.\n\n2. In our fuzz test case, the timing of the controller\u0027s response to this\npacket was delayed to an unexpected point: after the RFCOMM and L2CAP\nlayers had disconnected but before the HCI layer had disconnected.\n\n3. After receiving the Encryption Key Size Response at the time described\nin point 2, the host still called the rfcomm_check_security function.\nHowever, by this time `struct l2cap_conn *conn = l2cap_pi(sk)-\u003echan-\u003econn;`\nhad already been released, and when the function executed\n`return hci_conn_security(conn-\u003ehcon, d-\u003esec_level, auth_type, d-\u003eout);`,\nspecifically when accessing `conn-\u003ehcon`, a null-ptr-deref error occurred.\n\nTo fix this bug, check if `sk-\u003esk_state` is BT_CLOSED before calling\nrfcomm_recv_frame in rfcomm_process_rx.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26903",
          "url": "https://www.suse.com/security/cve/CVE-2024-26903"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223187 for CVE-2024-26903",
          "url": "https://bugzilla.suse.com/1223187"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:29:53Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26903"
    },
    {
      "cve": "CVE-2024-26915",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26915"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amdgpu: Reset IH OVERFLOW_CLEAR bit\n\nAllows us to detect subsequent IH ring buffer overflows as well.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26915",
          "url": "https://www.suse.com/security/cve/CVE-2024-26915"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223207 for CVE-2024-26915",
          "url": "https://bugzilla.suse.com/1223207"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:29:53Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26915"
    },
    {
      "cve": "CVE-2024-26917",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26917"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: Revert \"scsi: fcoe: Fix potential deadlock on \u0026fip-\u003ectlr_lock\"\n\nThis reverts commit 1a1975551943f681772720f639ff42fbaa746212.\n\nThis commit causes interrupts to be lost for FCoE devices, since it changed\nsping locks from \"bh\" to \"irqsave\".\n\nInstead, a work queue should be used, and will be addressed in a separate\ncommit.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26917",
          "url": "https://www.suse.com/security/cve/CVE-2024-26917"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223056 for CVE-2024-26917",
          "url": "https://bugzilla.suse.com/1223056"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:29:53Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26917"
    },
    {
      "cve": "CVE-2024-26927",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26927"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nASoC: SOF: Add some bounds checking to firmware data\n\nSmatch complains about \"head-\u003efull_size - head-\u003eheader_size\" can\nunderflow.  To some extent, we\u0027re always going to have to trust the\nfirmware a bit.  However, it\u0027s easy enough to add a check for negatives,\nand let\u0027s add a upper bounds check as well.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26927",
          "url": "https://www.suse.com/security/cve/CVE-2024-26927"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223525 for CVE-2024-26927",
          "url": "https://bugzilla.suse.com/1223525"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:29:53Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26927"
    },
    {
      "cve": "CVE-2024-26933",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26933"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nUSB: core: Fix deadlock in port \"disable\" sysfs attribute\n\nThe show and store callback routines for the \"disable\" sysfs attribute\nfile in port.c acquire the device lock for the port\u0027s parent hub\ndevice.  This can cause problems if another process has locked the hub\nto remove it or change its configuration:\n\n\tRemoving the hub or changing its configuration requires the\n\thub interface to be removed, which requires the port device\n\tto be removed, and device_del() waits until all outstanding\n\tsysfs attribute callbacks for the ports have returned.  The\n\tlock can\u0027t be released until then.\n\n\tBut the disable_show() or disable_store() routine can\u0027t return\n\tuntil after it has acquired the lock.\n\nThe resulting deadlock can be avoided by calling\nsysfs_break_active_protection().  This will cause the sysfs core not\nto wait for the attribute\u0027s callback routine to return, allowing the\nremoval to proceed.  The disadvantage is that after making this call,\nthere is no guarantee that the hub structure won\u0027t be deallocated at\nany moment.  To prevent this, we have to acquire a reference to it\nfirst by calling hub_get().",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26933",
          "url": "https://www.suse.com/security/cve/CVE-2024-26933"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223670 for CVE-2024-26933",
          "url": "https://bugzilla.suse.com/1223670"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:29:53Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26933"
    },
    {
      "cve": "CVE-2024-26939",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26939"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/i915/vma: Fix UAF on destroy against retire race\n\nObject debugging tools were sporadically reporting illegal attempts to\nfree a still active i915 VMA object when parking a GT believed to be idle.\n\n[161.359441] ODEBUG: free active (active state 0) object: ffff88811643b958 object type: i915_active hint: __i915_vma_active+0x0/0x50 [i915]\n[161.360082] WARNING: CPU: 5 PID: 276 at lib/debugobjects.c:514 debug_print_object+0x80/0xb0\n...\n[161.360304] CPU: 5 PID: 276 Comm: kworker/5:2 Not tainted 6.5.0-rc1-CI_DRM_13375-g003f860e5577+ #1\n[161.360314] Hardware name: Intel Corporation Rocket Lake Client Platform/RocketLake S UDIMM 6L RVP, BIOS RKLSFWI1.R00.3173.A03.2204210138 04/21/2022\n[161.360322] Workqueue: i915-unordered __intel_wakeref_put_work [i915]\n[161.360592] RIP: 0010:debug_print_object+0x80/0xb0\n...\n[161.361347] debug_object_free+0xeb/0x110\n[161.361362] i915_active_fini+0x14/0x130 [i915]\n[161.361866] release_references+0xfe/0x1f0 [i915]\n[161.362543] i915_vma_parked+0x1db/0x380 [i915]\n[161.363129] __gt_park+0x121/0x230 [i915]\n[161.363515] ____intel_wakeref_put_last+0x1f/0x70 [i915]\n\nThat has been tracked down to be happening when another thread is\ndeactivating the VMA inside __active_retire() helper, after the VMA\u0027s\nactive counter has been already decremented to 0, but before deactivation\nof the VMA\u0027s object is reported to the object debugging tool.\n\nWe could prevent from that race by serializing i915_active_fini() with\n__active_retire() via ref-\u003etree_lock, but that wouldn\u0027t stop the VMA from\nbeing used, e.g. from __i915_vma_retire() called at the end of\n__active_retire(), after that VMA has been already freed by a concurrent\ni915_vma_destroy() on return from the i915_active_fini().  Then, we should\nrather fix the issue at the VMA level, not in i915_active.\n\nSince __i915_vma_parked() is called from __gt_park() on last put of the\nGT\u0027s wakeref, the issue could be addressed by holding the GT wakeref long\nenough for __active_retire() to complete before that wakeref is released\nand the GT parked.\n\nI believe the issue was introduced by commit d93939730347 (\"drm/i915:\nRemove the vma refcount\") which moved a call to i915_active_fini() from\na dropped i915_vma_release(), called on last put of the removed VMA kref,\nto i915_vma_parked() processing path called on last put of a GT wakeref.\nHowever, its visibility to the object debugging tool was suppressed by a\nbug in i915_active that was fixed two weeks later with commit e92eb246feb9\n(\"drm/i915/active: Fix missing debug object activation\").\n\nA VMA associated with a request doesn\u0027t acquire a GT wakeref by itself.\nInstead, it depends on a wakeref held directly by the request\u0027s active\nintel_context for a GT associated with its VM, and indirectly on that\nintel_context\u0027s engine wakeref if the engine belongs to the same GT as the\nVMA\u0027s VM.  Those wakerefs are released asynchronously to VMA deactivation.\n\nFix the issue by getting a wakeref for the VMA\u0027s GT when activating it,\nand putting that wakeref only after the VMA is deactivated.  However,\nexclude global GTT from that processing path, otherwise the GPU never goes\nidle.  Since __i915_vma_retire() may be called from atomic contexts, use\nasync variant of wakeref put.  Also, to avoid circular locking dependency,\ntake care of acquiring the wakeref before VM mutex when both are needed.\n\nv7: Add inline comments with justifications for:\n    - using untracked variants of intel_gt_pm_get/put() (Nirmoy),\n    - using async variant of _put(),\n    - not getting the wakeref in case of a global GTT,\n    - always getting the first wakeref outside vm-\u003emutex.\nv6: Since __i915_vma_active/retire() callbacks are not serialized, storing\n    a wakeref tracking handle inside struct i915_vma is not safe, and\n    there is no other good place for that.  Use untracked variants of\n    intel_gt_pm_get/put_async().\nv5: Replace \"tile\" with \"GT\" across commit description (Rodrigo),\n  - \n---truncated---",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26939",
          "url": "https://www.suse.com/security/cve/CVE-2024-26939"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223679 for CVE-2024-26939",
          "url": "https://bugzilla.suse.com/1223679"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223680 for CVE-2024-26939",
          "url": "https://bugzilla.suse.com/1223680"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:29:53Z",
          "details": "important"
        }
      ],
      "title": "CVE-2024-26939"
    },
    {
      "cve": "CVE-2024-26948",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26948"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/display: Add a dc_state NULL check in dc_state_release\n\n[How]\nCheck wheather state is NULL before releasing it.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26948",
          "url": "https://www.suse.com/security/cve/CVE-2024-26948"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223664 for CVE-2024-26948",
          "url": "https://bugzilla.suse.com/1223664"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:29:53Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26948"
    },
    {
      "cve": "CVE-2024-26950",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26950"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwireguard: netlink: access device through ctx instead of peer\n\nThe previous commit fixed a bug that led to a NULL peer-\u003edevice being\ndereferenced. It\u0027s actually easier and faster performance-wise to\ninstead get the device from ctx-\u003ewg. This semantically makes more sense\ntoo, since ctx-\u003ewg-\u003epeer_allowedips.seq is compared with\nctx-\u003eallowedips_seq, basing them both in ctx. This also acts as a\ndefence in depth provision against freed peers.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26950",
          "url": "https://www.suse.com/security/cve/CVE-2024-26950"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223661 for CVE-2024-26950",
          "url": "https://bugzilla.suse.com/1223661"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:29:53Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26950"
    },
    {
      "cve": "CVE-2024-26951",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26951"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwireguard: netlink: check for dangling peer via is_dead instead of empty list\n\nIf all peers are removed via wg_peer_remove_all(), rather than setting\npeer_list to empty, the peer is added to a temporary list with a head on\nthe stack of wg_peer_remove_all(). If a netlink dump is resumed and the\ncursored peer is one that has been removed via wg_peer_remove_all(), it\nwill iterate from that peer and then attempt to dump freed peers.\n\nFix this by instead checking peer-\u003eis_dead, which was explictly created\nfor this purpose. Also move up the device_update_lock lockdep assertion,\nsince reading is_dead relies on that.\n\nIt can be reproduced by a small script like:\n\n    echo \"Setting config...\"\n    ip link add dev wg0 type wireguard\n    wg setconf wg0 /big-config\n    (\n            while true; do\n                    echo \"Showing config...\"\n                    wg showconf wg0 \u003e /dev/null\n            done\n    ) \u0026\n    sleep 4\n    wg setconf wg0 \u003c(printf \"[Peer]\\nPublicKey=$(wg genkey)\\n\")\n\nResulting in:\n\n    BUG: KASAN: slab-use-after-free in __lock_acquire+0x182a/0x1b20\n    Read of size 8 at addr ffff88811956ec70 by task wg/59\n    CPU: 2 PID: 59 Comm: wg Not tainted 6.8.0-rc2-debug+ #5\n    Call Trace:\n     \u003cTASK\u003e\n     dump_stack_lvl+0x47/0x70\n     print_address_description.constprop.0+0x2c/0x380\n     print_report+0xab/0x250\n     kasan_report+0xba/0xf0\n     __lock_acquire+0x182a/0x1b20\n     lock_acquire+0x191/0x4b0\n     down_read+0x80/0x440\n     get_peer+0x140/0xcb0\n     wg_get_device_dump+0x471/0x1130",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26951",
          "url": "https://www.suse.com/security/cve/CVE-2024-26951"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223660 for CVE-2024-26951",
          "url": "https://bugzilla.suse.com/1223660"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:29:53Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26951"
    },
    {
      "cve": "CVE-2024-26955",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26955"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnilfs2: prevent kernel bug at submit_bh_wbc()\n\nFix a bug where nilfs_get_block() returns a successful status when\nsearching and inserting the specified block both fail inconsistently.  If\nthis inconsistent behavior is not due to a previously fixed bug, then an\nunexpected race is occurring, so return a temporary error -EAGAIN instead.\n\nThis prevents callers such as __block_write_begin_int() from requesting a\nread into a buffer that is not mapped, which would cause the BUG_ON check\nfor the BH_Mapped flag in submit_bh_wbc() to fail.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26955",
          "url": "https://www.suse.com/security/cve/CVE-2024-26955"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223657 for CVE-2024-26955",
          "url": "https://bugzilla.suse.com/1223657"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:29:53Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26955"
    },
    {
      "cve": "CVE-2024-26956",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26956"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnilfs2: fix failure to detect DAT corruption in btree and direct mappings\n\nPatch series \"nilfs2: fix kernel bug at submit_bh_wbc()\".\n\nThis resolves a kernel BUG reported by syzbot.  Since there are two\nflaws involved, I\u0027ve made each one a separate patch.\n\nThe first patch alone resolves the syzbot-reported bug, but I think\nboth fixes should be sent to stable, so I\u0027ve tagged them as such.\n\n\nThis patch (of 2):\n\nSyzbot has reported a kernel bug in submit_bh_wbc() when writing file data\nto a nilfs2 file system whose metadata is corrupted.\n\nThere are two flaws involved in this issue.\n\nThe first flaw is that when nilfs_get_block() locates a data block using\nbtree or direct mapping, if the disk address translation routine\nnilfs_dat_translate() fails with internal code -ENOENT due to DAT metadata\ncorruption, it can be passed back to nilfs_get_block().  This causes\nnilfs_get_block() to misidentify an existing block as non-existent,\ncausing both data block lookup and insertion to fail inconsistently.\n\nThe second flaw is that nilfs_get_block() returns a successful status in\nthis inconsistent state.  This causes the caller __block_write_begin_int()\nor others to request a read even though the buffer is not mapped,\nresulting in a BUG_ON check for the BH_Mapped flag in submit_bh_wbc()\nfailing.\n\nThis fixes the first issue by changing the return value to code -EINVAL\nwhen a conversion using DAT fails with code -ENOENT, avoiding the\nconflicting condition that leads to the kernel bug described above.  Here,\ncode -EINVAL indicates that metadata corruption was detected during the\nblock lookup, which will be properly handled as a file system error and\nconverted to -EIO when passing through the nilfs2 bmap layer.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26956",
          "url": "https://www.suse.com/security/cve/CVE-2024-26956"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223663 for CVE-2024-26956",
          "url": "https://bugzilla.suse.com/1223663"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:29:53Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26956"
    },
    {
      "cve": "CVE-2024-26960",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26960"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm: swap: fix race between free_swap_and_cache() and swapoff()\n\nThere was previously a theoretical window where swapoff() could run and\nteardown a swap_info_struct while a call to free_swap_and_cache() was\nrunning in another thread.  This could cause, amongst other bad\npossibilities, swap_page_trans_huge_swapped() (called by\nfree_swap_and_cache()) to access the freed memory for swap_map.\n\nThis is a theoretical problem and I haven\u0027t been able to provoke it from a\ntest case.  But there has been agreement based on code review that this is\npossible (see link below).\n\nFix it by using get_swap_device()/put_swap_device(), which will stall\nswapoff().  There was an extra check in _swap_info_get() to confirm that\nthe swap entry was not free.  This isn\u0027t present in get_swap_device()\nbecause it doesn\u0027t make sense in general due to the race between getting\nthe reference and swapoff.  So I\u0027ve added an equivalent check directly in\nfree_swap_and_cache().\n\nDetails of how to provoke one possible issue (thanks to David Hildenbrand\nfor deriving this):\n\n--8\u003c-----\n\n__swap_entry_free() might be the last user and result in\n\"count == SWAP_HAS_CACHE\".\n\nswapoff-\u003etry_to_unuse() will stop as soon as soon as si-\u003einuse_pages==0.\n\nSo the question is: could someone reclaim the folio and turn\nsi-\u003einuse_pages==0, before we completed swap_page_trans_huge_swapped().\n\nImagine the following: 2 MiB folio in the swapcache. Only 2 subpages are\nstill references by swap entries.\n\nProcess 1 still references subpage 0 via swap entry.\nProcess 2 still references subpage 1 via swap entry.\n\nProcess 1 quits. Calls free_swap_and_cache().\n-\u003e count == SWAP_HAS_CACHE\n[then, preempted in the hypervisor etc.]\n\nProcess 2 quits. Calls free_swap_and_cache().\n-\u003e count == SWAP_HAS_CACHE\n\nProcess 2 goes ahead, passes swap_page_trans_huge_swapped(), and calls\n__try_to_reclaim_swap().\n\n__try_to_reclaim_swap()-\u003efolio_free_swap()-\u003edelete_from_swap_cache()-\u003e\nput_swap_folio()-\u003efree_swap_slot()-\u003eswapcache_free_entries()-\u003e\nswap_entry_free()-\u003eswap_range_free()-\u003e\n...\nWRITE_ONCE(si-\u003einuse_pages, si-\u003einuse_pages - nr_entries);\n\nWhat stops swapoff to succeed after process 2 reclaimed the swap cache\nbut before process1 finished its call to swap_page_trans_huge_swapped()?\n\n--8\u003c-----",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26960",
          "url": "https://www.suse.com/security/cve/CVE-2024-26960"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223655 for CVE-2024-26960",
          "url": "https://bugzilla.suse.com/1223655"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:29:53Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26960"
    },
    {
      "cve": "CVE-2024-26965",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26965"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nclk: qcom: mmcc-msm8974: fix terminating of frequency table arrays\n\nThe frequency table arrays are supposed to be terminated with an\nempty element. Add such entry to the end of the arrays where it\nis missing in order to avoid possible out-of-bound access when\nthe table is traversed by functions like qcom_find_freq() or\nqcom_find_freq_floor().\n\nOnly compile tested.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26965",
          "url": "https://www.suse.com/security/cve/CVE-2024-26965"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223648 for CVE-2024-26965",
          "url": "https://bugzilla.suse.com/1223648"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:29:53Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26965"
    },
    {
      "cve": "CVE-2024-26966",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26966"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nclk: qcom: mmcc-apq8084: fix terminating of frequency table arrays\n\nThe frequency table arrays are supposed to be terminated with an\nempty element. Add such entry to the end of the arrays where it\nis missing in order to avoid possible out-of-bound access when\nthe table is traversed by functions like qcom_find_freq() or\nqcom_find_freq_floor().\n\nOnly compile tested.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26966",
          "url": "https://www.suse.com/security/cve/CVE-2024-26966"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223646 for CVE-2024-26966",
          "url": "https://bugzilla.suse.com/1223646"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:29:53Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26966"
    },
    {
      "cve": "CVE-2024-26969",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26969"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nclk: qcom: gcc-ipq8074: fix terminating of frequency table arrays\n\nThe frequency table arrays are supposed to be terminated with an\nempty element. Add such entry to the end of the arrays where it\nis missing in order to avoid possible out-of-bound access when\nthe table is traversed by functions like qcom_find_freq() or\nqcom_find_freq_floor().\n\nOnly compile tested.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26969",
          "url": "https://www.suse.com/security/cve/CVE-2024-26969"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223645 for CVE-2024-26969",
          "url": "https://bugzilla.suse.com/1223645"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:29:53Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26969"
    },
    {
      "cve": "CVE-2024-26970",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26970"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nclk: qcom: gcc-ipq6018: fix terminating of frequency table arrays\n\nThe frequency table arrays are supposed to be terminated with an\nempty element. Add such entry to the end of the arrays where it\nis missing in order to avoid possible out-of-bound access when\nthe table is traversed by functions like qcom_find_freq() or\nqcom_find_freq_floor().\n\nOnly compile tested.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26970",
          "url": "https://www.suse.com/security/cve/CVE-2024-26970"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223644 for CVE-2024-26970",
          "url": "https://bugzilla.suse.com/1223644"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:29:53Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26970"
    },
    {
      "cve": "CVE-2024-26972",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26972"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26972",
          "url": "https://www.suse.com/security/cve/CVE-2024-26972"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223643 for CVE-2024-26972",
          "url": "https://bugzilla.suse.com/1223643"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:29:53Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26972"
    },
    {
      "cve": "CVE-2024-26979",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26979"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26979",
          "url": "https://www.suse.com/security/cve/CVE-2024-26979"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223628 for CVE-2024-26979",
          "url": "https://bugzilla.suse.com/1223628"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 0,
            "baseSeverity": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:29:53Z",
          "details": "low"
        }
      ],
      "title": "CVE-2024-26979"
    },
    {
      "cve": "CVE-2024-26981",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26981"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnilfs2: fix OOB in nilfs_set_de_type\n\nThe size of the nilfs_type_by_mode array in the fs/nilfs2/dir.c file is\ndefined as \"S_IFMT \u003e\u003e S_SHIFT\", but the nilfs_set_de_type() function,\nwhich uses this array, specifies the index to read from the array in the\nsame way as \"(mode \u0026 S_IFMT) \u003e\u003e S_SHIFT\".\n\nstatic void nilfs_set_de_type(struct nilfs_dir_entry *de, struct inode\n *inode)\n{\n\tumode_t mode = inode-\u003ei_mode;\n\n\tde-\u003efile_type = nilfs_type_by_mode[(mode \u0026 S_IFMT)\u003e\u003eS_SHIFT]; // oob\n}\n\nHowever, when the index is determined this way, an out-of-bounds (OOB)\nerror occurs by referring to an index that is 1 larger than the array size\nwhen the condition \"mode \u0026 S_IFMT == S_IFMT\" is satisfied.  Therefore, a\npatch to resize the nilfs_type_by_mode array should be applied to prevent\nOOB errors.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26981",
          "url": "https://www.suse.com/security/cve/CVE-2024-26981"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223668 for CVE-2024-26981",
          "url": "https://bugzilla.suse.com/1223668"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:29:53Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26981"
    },
    {
      "cve": "CVE-2024-26982",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26982"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nSquashfs: check the inode number is not the invalid value of zero\n\nSyskiller has produced an out of bounds access in fill_meta_index().\n\nThat out of bounds access is ultimately caused because the inode\nhas an inode number with the invalid value of zero, which was not checked.\n\nThe reason this causes the out of bounds access is due to following\nsequence of events:\n\n1. Fill_meta_index() is called to allocate (via empty_meta_index())\n   and fill a metadata index.  It however suffers a data read error\n   and aborts, invalidating the newly returned empty metadata index.\n   It does this by setting the inode number of the index to zero,\n   which means unused (zero is not a valid inode number).\n\n2. When fill_meta_index() is subsequently called again on another\n   read operation, locate_meta_index() returns the previous index\n   because it matches the inode number of 0.  Because this index\n   has been returned it is expected to have been filled, and because\n   it hasn\u0027t been, an out of bounds access is performed.\n\nThis patch adds a sanity check which checks that the inode number\nis not zero when the inode is created and returns -EINVAL if it is.\n\n[phillip@squashfs.org.uk: whitespace fix]\n  Link: https://lkml.kernel.org/r/20240409204723.446925-1-phillip@squashfs.org.uk",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26982",
          "url": "https://www.suse.com/security/cve/CVE-2024-26982"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223634 for CVE-2024-26982",
          "url": "https://bugzilla.suse.com/1223634"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:29:53Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26982"
    },
    {
      "cve": "CVE-2024-26993",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26993"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfs: sysfs: Fix reference leak in sysfs_break_active_protection()\n\nThe sysfs_break_active_protection() routine has an obvious reference\nleak in its error path.  If the call to kernfs_find_and_get() fails then\nkn will be NULL, so the companion sysfs_unbreak_active_protection()\nroutine won\u0027t get called (and would only cause an access violation by\ntrying to dereference kn-\u003eparent if it was called).  As a result, the\nreference to kobj acquired at the start of the function will never be\nreleased.\n\nFix the leak by adding an explicit kobject_put() call when kn is NULL.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26993",
          "url": "https://www.suse.com/security/cve/CVE-2024-26993"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223693 for CVE-2024-26993",
          "url": "https://bugzilla.suse.com/1223693"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:29:53Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26993"
    },
    {
      "cve": "CVE-2024-27013",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-27013"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntun: limit printing rate when illegal packet received by tun dev\n\nvhost_worker will call tun call backs to receive packets. If too many\nillegal packets arrives, tun_do_read will keep dumping packet contents.\nWhen console is enabled, it will costs much more cpu time to dump\npacket and soft lockup will be detected.\n\nnet_ratelimit mechanism can be used to limit the dumping rate.\n\nPID: 33036    TASK: ffff949da6f20000  CPU: 23   COMMAND: \"vhost-32980\"\n #0 [fffffe00003fce50] crash_nmi_callback at ffffffff89249253\n #1 [fffffe00003fce58] nmi_handle at ffffffff89225fa3\n #2 [fffffe00003fceb0] default_do_nmi at ffffffff8922642e\n #3 [fffffe00003fced0] do_nmi at ffffffff8922660d\n #4 [fffffe00003fcef0] end_repeat_nmi at ffffffff89c01663\n    [exception RIP: io_serial_in+20]\n    RIP: ffffffff89792594  RSP: ffffa655314979e8  RFLAGS: 00000002\n    RAX: ffffffff89792500  RBX: ffffffff8af428a0  RCX: 0000000000000000\n    RDX: 00000000000003fd  RSI: 0000000000000005  RDI: ffffffff8af428a0\n    RBP: 0000000000002710   R8: 0000000000000004   R9: 000000000000000f\n    R10: 0000000000000000  R11: ffffffff8acbf64f  R12: 0000000000000020\n    R13: ffffffff8acbf698  R14: 0000000000000058  R15: 0000000000000000\n    ORIG_RAX: ffffffffffffffff  CS: 0010  SS: 0018\n #5 [ffffa655314979e8] io_serial_in at ffffffff89792594\n #6 [ffffa655314979e8] wait_for_xmitr at ffffffff89793470\n #7 [ffffa65531497a08] serial8250_console_putchar at ffffffff897934f6\n #8 [ffffa65531497a20] uart_console_write at ffffffff8978b605\n #9 [ffffa65531497a48] serial8250_console_write at ffffffff89796558\n #10 [ffffa65531497ac8] console_unlock at ffffffff89316124\n #11 [ffffa65531497b10] vprintk_emit at ffffffff89317c07\n #12 [ffffa65531497b68] printk at ffffffff89318306\n #13 [ffffa65531497bc8] print_hex_dump at ffffffff89650765\n #14 [ffffa65531497ca8] tun_do_read at ffffffffc0b06c27 [tun]\n #15 [ffffa65531497d38] tun_recvmsg at ffffffffc0b06e34 [tun]\n #16 [ffffa65531497d68] handle_rx at ffffffffc0c5d682 [vhost_net]\n #17 [ffffa65531497ed0] vhost_worker at ffffffffc0c644dc [vhost]\n #18 [ffffa65531497f10] kthread at ffffffff892d2e72\n #19 [ffffa65531497f50] ret_from_fork at ffffffff89c0022f",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-27013",
          "url": "https://www.suse.com/security/cve/CVE-2024-27013"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223745 for CVE-2024-27013",
          "url": "https://bugzilla.suse.com/1223745"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:29:53Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-27013"
    },
    {
      "cve": "CVE-2024-27014",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-27014"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/mlx5e: Prevent deadlock while disabling aRFS\n\nWhen disabling aRFS under the `priv-\u003estate_lock`, any scheduled\naRFS works are canceled using the `cancel_work_sync` function,\nwhich waits for the work to end if it has already started.\nHowever, while waiting for the work handler, the handler will\ntry to acquire the `state_lock` which is already acquired.\n\nThe worker acquires the lock to delete the rules if the state\nis down, which is not the worker\u0027s responsibility since\ndisabling aRFS deletes the rules.\n\nAdd an aRFS state variable, which indicates whether the aRFS is\nenabled and prevent adding rules when the aRFS is disabled.\n\nKernel log:\n\n======================================================\nWARNING: possible circular locking dependency detected\n6.7.0-rc4_net_next_mlx5_5483eb2 #1 Tainted: G          I\n------------------------------------------------------\nethtool/386089 is trying to acquire lock:\nffff88810f21ce68 ((work_completion)(\u0026rule-\u003earfs_work)){+.+.}-{0:0}, at: __flush_work+0x74/0x4e0\n\nbut task is already holding lock:\nffff8884a1808cc0 (\u0026priv-\u003estate_lock){+.+.}-{3:3}, at: mlx5e_ethtool_set_channels+0x53/0x200 [mlx5_core]\n\nwhich lock already depends on the new lock.\n\nthe existing dependency chain (in reverse order) is:\n\n-\u003e #1 (\u0026priv-\u003estate_lock){+.+.}-{3:3}:\n       __mutex_lock+0x80/0xc90\n       arfs_handle_work+0x4b/0x3b0 [mlx5_core]\n       process_one_work+0x1dc/0x4a0\n       worker_thread+0x1bf/0x3c0\n       kthread+0xd7/0x100\n       ret_from_fork+0x2d/0x50\n       ret_from_fork_asm+0x11/0x20\n\n-\u003e #0 ((work_completion)(\u0026rule-\u003earfs_work)){+.+.}-{0:0}:\n       __lock_acquire+0x17b4/0x2c80\n       lock_acquire+0xd0/0x2b0\n       __flush_work+0x7a/0x4e0\n       __cancel_work_timer+0x131/0x1c0\n       arfs_del_rules+0x143/0x1e0 [mlx5_core]\n       mlx5e_arfs_disable+0x1b/0x30 [mlx5_core]\n       mlx5e_ethtool_set_channels+0xcb/0x200 [mlx5_core]\n       ethnl_set_channels+0x28f/0x3b0\n       ethnl_default_set_doit+0xec/0x240\n       genl_family_rcv_msg_doit+0xd0/0x120\n       genl_rcv_msg+0x188/0x2c0\n       netlink_rcv_skb+0x54/0x100\n       genl_rcv+0x24/0x40\n       netlink_unicast+0x1a1/0x270\n       netlink_sendmsg+0x214/0x460\n       __sock_sendmsg+0x38/0x60\n       __sys_sendto+0x113/0x170\n       __x64_sys_sendto+0x20/0x30\n       do_syscall_64+0x40/0xe0\n       entry_SYSCALL_64_after_hwframe+0x46/0x4e\n\nother info that might help us debug this:\n\n Possible unsafe locking scenario:\n\n       CPU0                    CPU1\n       ----                    ----\n  lock(\u0026priv-\u003estate_lock);\n                               lock((work_completion)(\u0026rule-\u003earfs_work));\n                               lock(\u0026priv-\u003estate_lock);\n  lock((work_completion)(\u0026rule-\u003earfs_work));\n\n *** DEADLOCK ***\n\n3 locks held by ethtool/386089:\n #0: ffffffff82ea7210 (cb_lock){++++}-{3:3}, at: genl_rcv+0x15/0x40\n #1: ffffffff82e94c88 (rtnl_mutex){+.+.}-{3:3}, at: ethnl_default_set_doit+0xd3/0x240\n #2: ffff8884a1808cc0 (\u0026priv-\u003estate_lock){+.+.}-{3:3}, at: mlx5e_ethtool_set_channels+0x53/0x200 [mlx5_core]\n\nstack backtrace:\nCPU: 15 PID: 386089 Comm: ethtool Tainted: G          I        6.7.0-rc4_net_next_mlx5_5483eb2 #1\nHardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014\nCall Trace:\n \u003cTASK\u003e\n dump_stack_lvl+0x60/0xa0\n check_noncircular+0x144/0x160\n __lock_acquire+0x17b4/0x2c80\n lock_acquire+0xd0/0x2b0\n ? __flush_work+0x74/0x4e0\n ? save_trace+0x3e/0x360\n ? __flush_work+0x74/0x4e0\n __flush_work+0x7a/0x4e0\n ? __flush_work+0x74/0x4e0\n ? __lock_acquire+0xa78/0x2c80\n ? lock_acquire+0xd0/0x2b0\n ? mark_held_locks+0x49/0x70\n __cancel_work_timer+0x131/0x1c0\n ? mark_held_locks+0x49/0x70\n arfs_del_rules+0x143/0x1e0 [mlx5_core]\n mlx5e_arfs_disable+0x1b/0x30 [mlx5_core]\n mlx5e_ethtool_set_channels+0xcb/0x200 [mlx5_core]\n ethnl_set_channels+0x28f/0x3b0\n ethnl_default_set_doit+0xec/0x240\n genl_family_rcv_msg_doit+0xd0/0x120\n genl_rcv_msg+0x188/0x2c0\n ? ethn\n---truncated---",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-27014",
          "url": "https://www.suse.com/security/cve/CVE-2024-27014"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223735 for CVE-2024-27014",
          "url": "https://bugzilla.suse.com/1223735"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:29:53Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-27014"
    },
    {
      "cve": "CVE-2024-27030",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-27030"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nocteontx2-af: Use separate handlers for interrupts\n\nFor PF to AF interrupt vector and VF to AF vector same\ninterrupt handler is registered which is causing race condition.\nWhen two interrupts are raised to two CPUs at same time\nthen two cores serve same event corrupting the data.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-27030",
          "url": "https://www.suse.com/security/cve/CVE-2024-27030"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223790 for CVE-2024-27030",
          "url": "https://bugzilla.suse.com/1223790"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:29:53Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-27030"
    },
    {
      "cve": "CVE-2024-27038",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-27038"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nclk: Fix clk_core_get NULL dereference\n\nIt is possible for clk_core_get to dereference a NULL in the following\nsequence:\n\nclk_core_get()\n    of_clk_get_hw_from_clkspec()\n        __of_clk_get_hw_from_provider()\n            __clk_get_hw()\n\n__clk_get_hw() can return NULL which is dereferenced by clk_core_get() at\nhw-\u003ecore.\n\nPrior to commit dde4eff47c82 (\"clk: Look for parents with clkdev based\nclk_lookups\") the check IS_ERR_OR_NULL() was performed which would have\ncaught the NULL.\n\nReading the description of this function it talks about returning NULL but\nthat cannot be so at the moment.\n\nUpdate the function to check for hw before dereferencing it and return NULL\nif hw is NULL.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-27038",
          "url": "https://www.suse.com/security/cve/CVE-2024-27038"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223816 for CVE-2024-27038",
          "url": "https://bugzilla.suse.com/1223816"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:29:53Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-27038"
    },
    {
      "cve": "CVE-2024-27039",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-27039"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nclk: hisilicon: hi3559a: Fix an erroneous devm_kfree()\n\n\u0027p_clk\u0027 is an array allocated just before the for loop for all clk that\nneed to be registered.\nIt is incremented at each loop iteration.\n\nIf a clk_register() call fails, \u0027p_clk\u0027 may point to something different\nfrom what should be freed.\n\nThe best we can do, is to avoid this wrong release of memory.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-27039",
          "url": "https://www.suse.com/security/cve/CVE-2024-27039"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223821 for CVE-2024-27039",
          "url": "https://bugzilla.suse.com/1223821"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:29:53Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-27039"
    },
    {
      "cve": "CVE-2024-27041",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-27041"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/display: fix NULL checks for adev-\u003edm.dc in amdgpu_dm_fini()\n\nSince \u0027adev-\u003edm.dc\u0027 in amdgpu_dm_fini() might turn out to be NULL\nbefore the call to dc_enable_dmub_notifications(), check\nbeforehand to ensure there will not be a possible NULL-ptr-deref\nthere.\n\nAlso, since commit 1e88eb1b2c25 (\"drm/amd/display: Drop\nCONFIG_DRM_AMD_DC_HDCP\") there are two separate checks for NULL in\n\u0027adev-\u003edm.dc\u0027 before dc_deinit_callbacks() and dc_dmub_srv_destroy().\nClean up by combining them all under one \u0027if\u0027.\n\nFound by Linux Verification Center (linuxtesting.org) with static\nanalysis tool SVACE.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-27041",
          "url": "https://www.suse.com/security/cve/CVE-2024-27041"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223714 for CVE-2024-27041",
          "url": "https://bugzilla.suse.com/1223714"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:29:53Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-27041"
    },
    {
      "cve": "CVE-2024-27042",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-27042"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amdgpu: Fix potential out-of-bounds access in \u0027amdgpu_discovery_reg_base_init()\u0027\n\nThe issue arises when the array \u0027adev-\u003evcn.vcn_config\u0027 is accessed\nbefore checking if the index \u0027adev-\u003evcn.num_vcn_inst\u0027 is within the\nbounds of the array.\n\nThe fix involves moving the bounds check before the array access. This\nensures that \u0027adev-\u003evcn.num_vcn_inst\u0027 is within the bounds of the array\nbefore it is used as an index.\n\nFixes the below:\ndrivers/gpu/drm/amd/amdgpu/amdgpu_discovery.c:1289 amdgpu_discovery_reg_base_init() error: testing array offset \u0027adev-\u003evcn.num_vcn_inst\u0027 after use.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-27042",
          "url": "https://www.suse.com/security/cve/CVE-2024-27042"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223823 for CVE-2024-27042",
          "url": "https://bugzilla.suse.com/1223823"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:29:53Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-27042"
    },
    {
      "cve": "CVE-2024-27043",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-27043"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: edia: dvbdev: fix a use-after-free\n\nIn dvb_register_device, *pdvbdev is set equal to dvbdev, which is freed\nin several error-handling paths. However, *pdvbdev is not set to NULL\nafter dvbdev\u0027s deallocation, causing use-after-frees in many places,\nfor example, in the following call chain:\n\nbudget_register\n  |-\u003e dvb_dmxdev_init\n        |-\u003e dvb_register_device\n  |-\u003e dvb_dmxdev_release\n        |-\u003e dvb_unregister_device\n              |-\u003e dvb_remove_device\n                    |-\u003e dvb_device_put\n                          |-\u003e kref_put\n\nWhen calling dvb_unregister_device, dmxdev-\u003edvbdev (i.e. *pdvbdev in\ndvb_register_device) could point to memory that had been freed in\ndvb_register_device. Thereafter, this pointer is transferred to\nkref_put and triggering a use-after-free.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-27043",
          "url": "https://www.suse.com/security/cve/CVE-2024-27043"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1218562 for CVE-2024-27043",
          "url": "https://bugzilla.suse.com/1218562"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223824 for CVE-2024-27043",
          "url": "https://bugzilla.suse.com/1223824"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223825 for CVE-2024-27043",
          "url": "https://bugzilla.suse.com/1223825"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:29:53Z",
          "details": "important"
        }
      ],
      "title": "CVE-2024-27043"
    },
    {
      "cve": "CVE-2024-27046",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-27046"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnfp: flower: handle acti_netdevs allocation failure\n\nThe kmalloc_array() in nfp_fl_lag_do_work() will return null, if\nthe physical memory has run out. As a result, if we dereference\nthe acti_netdevs, the null pointer dereference bugs will happen.\n\nThis patch adds a check to judge whether allocation failure occurs.\nIf it happens, the delayed work will be rescheduled and try again.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-27046",
          "url": "https://www.suse.com/security/cve/CVE-2024-27046"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223827 for CVE-2024-27046",
          "url": "https://bugzilla.suse.com/1223827"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:29:53Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-27046"
    },
    {
      "cve": "CVE-2024-27056",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-27056"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: iwlwifi: mvm: ensure offloading TID queue exists\n\nThe resume code path assumes that the TX queue for the offloading TID\nhas been configured. At resume time it then tries to sync the write\npointer as it may have been updated by the firmware.\n\nIn the unusual event that no packets have been send on TID 0, the queue\nwill not have been allocated and this causes a crash. Fix this by\nensuring the queue exist at suspend time.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-27056",
          "url": "https://www.suse.com/security/cve/CVE-2024-27056"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223822 for CVE-2024-27056",
          "url": "https://bugzilla.suse.com/1223822"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:29:53Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-27056"
    },
    {
      "cve": "CVE-2024-27059",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-27059"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nUSB: usb-storage: Prevent divide-by-0 error in isd200_ata_command\n\nThe isd200 sub-driver in usb-storage uses the HEADS and SECTORS values\nin the ATA ID information to calculate cylinder and head values when\ncreating a CDB for READ or WRITE commands.  The calculation involves\ndivision and modulus operations, which will cause a crash if either of\nthese values is 0.  While this never happens with a genuine device, it\ncould happen with a flawed or subversive emulation, as reported by the\nsyzbot fuzzer.\n\nProtect against this possibility by refusing to bind to the device if\neither the ATA_ID_HEADS or ATA_ID_SECTORS value in the device\u0027s ID\ninformation is 0.  This requires isd200_Initialization() to return a\nnegative error code when initialization fails; currently it always\nreturns 0 (even when there is an error).",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-27059",
          "url": "https://www.suse.com/security/cve/CVE-2024-27059"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223738 for CVE-2024-27059",
          "url": "https://bugzilla.suse.com/1223738"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:29:53Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-27059"
    },
    {
      "cve": "CVE-2024-27062",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-27062"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnouveau: lock the client object tree.\n\nIt appears the client object tree has no locking unless I\u0027ve missed\nsomething else. Fix races around adding/removing client objects,\nmostly vram bar mappings.\n\n 4562.099306] general protection fault, probably for non-canonical address 0x6677ed422bceb80c: 0000 [#1] PREEMPT SMP PTI\n[ 4562.099314] CPU: 2 PID: 23171 Comm: deqp-vk Not tainted 6.8.0-rc6+ #27\n[ 4562.099324] Hardware name: Gigabyte Technology Co., Ltd. Z390 I AORUS PRO WIFI/Z390 I AORUS PRO WIFI-CF, BIOS F8 11/05/2021\n[ 4562.099330] RIP: 0010:nvkm_object_search+0x1d/0x70 [nouveau]\n[ 4562.099503] Code: 90 90 90 90 90 90 90 90 90 90 90 90 90 66 0f 1f 00 0f 1f 44 00 00 48 89 f8 48 85 f6 74 39 48 8b 87 a0 00 00 00 48 85 c0 74 12 \u003c48\u003e 8b 48 f8 48 39 ce 73 15 48 8b 40 10 48 85 c0 75 ee 48 c7 c0 fe\n[ 4562.099506] RSP: 0000:ffffa94cc420bbf8 EFLAGS: 00010206\n[ 4562.099512] RAX: 6677ed422bceb814 RBX: ffff98108791f400 RCX: ffff9810f26b8f58\n[ 4562.099517] RDX: 0000000000000000 RSI: ffff9810f26b9158 RDI: ffff98108791f400\n[ 4562.099519] RBP: ffff9810f26b9158 R08: 0000000000000000 R09: 0000000000000000\n[ 4562.099521] R10: ffffa94cc420bc48 R11: 0000000000000001 R12: ffff9810f02a7cc0\n[ 4562.099526] R13: 0000000000000000 R14: 00000000000000ff R15: 0000000000000007\n[ 4562.099528] FS:  00007f629c5017c0(0000) GS:ffff98142c700000(0000) knlGS:0000000000000000\n[ 4562.099534] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[ 4562.099536] CR2: 00007f629a882000 CR3: 000000017019e004 CR4: 00000000003706f0\n[ 4562.099541] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n[ 4562.099542] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\n[ 4562.099544] Call Trace:\n[ 4562.099555]  \u003cTASK\u003e\n[ 4562.099573]  ? die_addr+0x36/0x90\n[ 4562.099583]  ? exc_general_protection+0x246/0x4a0\n[ 4562.099593]  ? asm_exc_general_protection+0x26/0x30\n[ 4562.099600]  ? nvkm_object_search+0x1d/0x70 [nouveau]\n[ 4562.099730]  nvkm_ioctl+0xa1/0x250 [nouveau]\n[ 4562.099861]  nvif_object_map_handle+0xc8/0x180 [nouveau]\n[ 4562.099986]  nouveau_ttm_io_mem_reserve+0x122/0x270 [nouveau]\n[ 4562.100156]  ? dma_resv_test_signaled+0x26/0xb0\n[ 4562.100163]  ttm_bo_vm_fault_reserved+0x97/0x3c0 [ttm]\n[ 4562.100182]  ? __mutex_unlock_slowpath+0x2a/0x270\n[ 4562.100189]  nouveau_ttm_fault+0x69/0xb0 [nouveau]\n[ 4562.100356]  __do_fault+0x32/0x150\n[ 4562.100362]  do_fault+0x7c/0x560\n[ 4562.100369]  __handle_mm_fault+0x800/0xc10\n[ 4562.100382]  handle_mm_fault+0x17c/0x3e0\n[ 4562.100388]  do_user_addr_fault+0x208/0x860\n[ 4562.100395]  exc_page_fault+0x7f/0x200\n[ 4562.100402]  asm_exc_page_fault+0x26/0x30\n[ 4562.100412] RIP: 0033:0x9b9870\n[ 4562.100419] Code: 85 a8 f7 ff ff 8b 8d 80 f7 ff ff 89 08 e9 18 f2 ff ff 0f 1f 84 00 00 00 00 00 44 89 32 e9 90 fa ff ff 0f 1f 84 00 00 00 00 00 \u003c44\u003e 89 32 e9 f8 f1 ff ff 0f 1f 84 00 00 00 00 00 66 44 89 32 e9 e7\n[ 4562.100422] RSP: 002b:00007fff9ba2dc70 EFLAGS: 00010246\n[ 4562.100426] RAX: 0000000000000004 RBX: 000000000dd65e10 RCX: 000000fff0000000\n[ 4562.100428] RDX: 00007f629a882000 RSI: 00007f629a882000 RDI: 0000000000000066\n[ 4562.100432] RBP: 00007fff9ba2e570 R08: 0000000000000000 R09: 0000000123ddf000\n[ 4562.100434] R10: 0000000000000001 R11: 0000000000000246 R12: 000000007fffffff\n[ 4562.100436] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000\n[ 4562.100446]  \u003c/TASK\u003e\n[ 4562.100448] Modules linked in: nf_conntrack_netbios_ns nf_conntrack_broadcast nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib nft_reject_inet nf_reject_ipv4 nf_reject_ipv6 nft_reject nft_ct nft_chain_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 ip_set nf_tables libcrc32c nfnetlink cmac bnep sunrpc iwlmvm intel_rapl_msr intel_rapl_common snd_sof_pci_intel_cnl x86_pkg_temp_thermal intel_powerclamp snd_sof_intel_hda_common mac80211 coretemp snd_soc_acpi_intel_match kvm_intel snd_soc_acpi snd_soc_hdac_hda snd_sof_pci snd_sof_xtensa_dsp snd_sof_intel_hda_mlink \n---truncated---",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-27062",
          "url": "https://www.suse.com/security/cve/CVE-2024-27062"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223834 for CVE-2024-27062",
          "url": "https://bugzilla.suse.com/1223834"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:29:53Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-27062"
    },
    {
      "cve": "CVE-2024-27389",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-27389"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\npstore: inode: Only d_invalidate() is needed\n\nUnloading a modular pstore backend with records in pstorefs would\ntrigger the dput() double-drop warning:\n\n  WARNING: CPU: 0 PID: 2569 at fs/dcache.c:762 dput.part.0+0x3f3/0x410\n\nUsing the combo of d_drop()/dput() (as mentioned in\nDocumentation/filesystems/vfs.rst) isn\u0027t the right approach here, and\nleads to the reference counting problem seen above. Use d_invalidate()\nand update the code to not bother checking for error codes that can\nnever happen.\n\n---",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-27389",
          "url": "https://www.suse.com/security/cve/CVE-2024-27389"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223705 for CVE-2024-27389",
          "url": "https://bugzilla.suse.com/1223705"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.51.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.51.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.51.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:29:53Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-27389"
    }
  ]
}
  suse-su-2024:2184-1
Vulnerability from csaf_suse
Published
2024-06-24 18:34
    Modified
2024-06-24 18:34
    Summary
Security update for the Linux Kernel
    Notes
Title of the patch
Security update for the Linux Kernel
    Description of the patch
The SUSE Linux Enterprise 12 SP5 kernel was updated to receive various security bugfixes.
The following security bugs were fixed:
- CVE-2021-46933: Fixed possible underflow in ffs_data_clear() (bsc#1220487).
- CVE-2021-46955: Fixed an out-of-bounds read with openvswitch, when fragmenting IPv4 packets (bsc#1220513).
- CVE-2021-47074: Fixed memory leak in nvme_loop_create_ctrl() (bsc#1220854).
- CVE-2021-47113: Abort btrfs rename_exchange if we fail to insert the second ref (bsc#1221543).
- CVE-2021-47131: Fixed a use-after-free after the TLS device goes down and up (bsc#1221545).
- CVE-2021-47206: Check return value after calling  platform_get_resource() (bsc#1222894).
- CVE-2021-47238: Fixed memory leak in ip_mc_add1_src  (bsc#1224847)
- CVE-2021-47245: Fixed out of bounds when parsing TCP options  (bsc#1224838)
- CVE-2021-47246: Fixed page reclaim for dead peer hairpin  (CVE-2021-47246 bsc#1224831).
- CVE-2021-47249: Fixed memory leak in rds_recvmsg  (bsc#1224880)
- CVE-2021-47250: Fixed memory leak in netlbl_cipsov4_add_std  (bsc#1224827)
- CVE-2021-47265: Verify port when creating flow rule (bsc#1224957)
- CVE-2021-47277: Avoid speculation-based attacks from out-of-range memslot  accesses (bsc#1224960).
- CVE-2021-47281: Fixed race of snd_seq_timer_open() (bsc#1224983).
- CVE-2021-47334: Fixed two use after free in ibmasm_init_one  (bsc#1225112).
- CVE-2021-47352: Add validation for used length (bsc#1225124).
- CVE-2021-47355: Fixed possible use-after-free in nicstar_cleanup()  (bsc#1225141).
- CVE-2021-47357: Fixed possible use-after-free in ia_module_exit()  (bsc#1225144).
- CVE-2021-47361: Fixed error handling in mcb_alloc_bus() (bsc#1225151).
- CVE-2021-47362: Update intermediate power state for SI (bsc#1225153).
- CVE-2021-47378: Destroy cm id before destroy qp to avoid use after free (bsc#1225201).
- CVE-2021-47383: Fixed out-of-bound vmalloc access in imageblit (bsc#1225208).
- CVE-2021-47397: Break out if skb_header_pointer returns NULL in sctp_rcv_ootb  (bsc#1225082)
- CVE-2021-47401: Fixed stack information leak (bsc#1225242).
- CVE-2021-47423: Fixed file release memory leak (bsc#1225366).
- CVE-2021-47431: Fixed gart.bo pin_count leak (bsc#1225390).
- CVE-2021-47469: Add SPI fix commit to be ignored (bsc#1225347)
- CVE-2021-47483: Fixed possible double-free in regcache_rbtree_exit()  (bsc#1224907).
- CVE-2021-47496: Fix flipped sign in tls_err_abort() calls (bsc#1225354)
- CVE-2021-47497: Fixed shift-out-of-bound (UBSAN) with byte size cells (bsc#1225355).
- CVE-2021-47500: Fixed trigger reference couting (bsc#1225360).
- CVE-2021-47509: Limit the period size to 16MB (bsc#1225409).
- CVE-2021-47511: Fixed negative period/buffer sizes (bsc#1225411).
- CVE-2021-47548: Fixed a possible array out-of=bounds (bsc#1225506)
- CVE-2022-48672: Fixed off-by-one error in unflatten_dt_nodes()  (CVE-2022-48672 bsc#1223931).
- CVE-2022-48686: Fixed UAF when detecting digest errors (bsc#1223948).
- CVE-2022-48697: Fixed a use-after-free (bsc#1223922). 
- CVE-2022-48702: Fixed out of bounds access in  snd_emu10k1_pcm_channel_alloc() (bsc#1223923).
- CVE-2022-48704: Add a force flush to delay work when radeon (bsc#1223932)
- CVE-2022-48708: Fixed potential NULL dereference (bsc#1224942).
- CVE-2022-48710: Fixed a possible null pointer dereference (bsc#1225230).
- CVE-2023-1829: Fixed a use-after-free vulnerability in the control index filter (tcindex) (bsc#1210335).
- CVE-2023-42755: Check user supplied offsets (bsc#1215702).
- CVE-2023-52586: Fixed  mutex lock in control vblank irq (bsc#1221081).
- CVE-2023-52655: Check packet for fixup for true limit (bsc#1217169).
- CVE-2023-52664: Eliminate double free in error handling logic  (bsc#1224747).
- CVE-2023-52691: Fixed a double-free in si_dpm_init (bsc#1224607).
- CVE-2023-52698: Fixed memory leak in netlbl_calipso_add_pass()  (bsc#1224621)
- CVE-2023-52730: Fixed possible resource leaks in some error paths  (bsc#1224956).
- CVE-2023-52732: Blocklist the kclient when receiving corrupted snap trace  (bsc#1225222).
- CVE-2023-52747: Restore allocated resources on failed copyout (bsc#1224931)
- CVE-2023-52796: Add ipvlan_route_v6_outbound() helper (bsc#1224930).
- CVE-2023-52821: Fixed a possible null pointer dereference (bsc#1225022).
- CVE-2023-52864: Fixed opening of char device (bsc#1225132).
- CVE-2023-52865: Add check for mtk_alloc_clk_data  (bsc#1225086).
- CVE-2023-52867: Fixed possible buffer overflow (bsc#1225009).
- CVE-2023-52875: Add check for mtk_alloc_clk_data  (bsc#1225096).
- CVE-2024-0639: Fixed a denial-of-service vulnerability due to a deadlock found in sctp_auto_asconf_init in net/sctp/socket.c (bsc#1218917).
- CVE-2024-26625: Call sock_orphan() at release time  (bsc#1221086)
- CVE-2024-26775: Fixed potential deadlock at set_capacity (bsc#1222627).
- CVE-2024-26791: Fixed properly validate device names in btrfs (bsc#1222793)
- CVE-2024-26828: Fixed underflow in parse_server_interfaces() (bsc#1223084).
- CVE-2024-26846: Do not wait in vain when unloading module  (bsc#1223023).
- CVE-2024-26874: Fixed a null pointer crash in (bsc#1223048)
- CVE-2024-26876: Fixed crash on irq during probe (bsc#1223119).
- CVE-2024-26900: Fixed kmemleak of rdev->serial (bsc#1223046).
- CVE-2024-26915: Reset IH OVERFLOW_CLEAR bit (bsc#1223207)
- CVE-2024-26921: Preserve kabi for sk_buff (bsc#1223138).
- CVE-2024-26957: Fixed reference counting on zcrypt card objects  (bsc#1223666).
- CVE-2024-26958: Fixed UAF in direct writes (bsc#1223653).
- CVE-2024-26984: Fixed instmem race condition around ptr stores (bsc#1223633)
- CVE-2024-26996: Fixed UAF ncm object at re-bind after usb  ep transport error (bsc#1223752).
- CVE-2024-27008: Fixed out of bounds access (CVE-2024-27008 bsc#1223802).
- CVE-2024-27062: Fixed nouveau lock inside client object tree (bsc#1223834).
- CVE-2024-27396: Fixed Use-After-Free in gtp_dellink (bsc#1224096).
- CVE-2024-27398: Fixed use-after-free bugs caused by sco_sock_timeout (bsc#1224174).
- CVE-2024-27401: Fixed user_length taken into account when  fetching packet contents (bsc#1224181).
- CVE-2024-27419: Fixed data-races around sysctl_net_busy_read  (bsc#1224759)
- CVE-2024-27436: Stop parsing channels bits when all channels  are found (bsc#1224803).
- CVE-2024-35789: Check fast rx for non-4addr sta VLAN  changes (bsc#1224749).
- CVE-2024-35791: Flush pages under kvm->lock to fix UAF in  svm_register_enc_region() (bsc#1224725).
- CVE-2024-35809: Drain runtime-idle callbacks before driver removal  (bsc#1224738).
- CVE-2024-35830: Register v4l2 async device only after  successful setup (bsc#1224680).
- CVE-2024-35849: Fixed information leak in btrfs_ioctl_logical_to_ino()  (bsc#1224733).
- CVE-2024-35877: Fixed VM_PAT handling in COW mappings (bsc#1224525).
- CVE-2024-35878: Prevent NULL pointer dereference in vsnprintf()  (bsc#1224671).
- CVE-2024-35887: Fixed use-after-free bugs caused by ax25_ds_del_timer  (bsc#1224663)
- CVE-2024-35932: Do not check if plane->state->fb == state->fb (bsc#1224650).
- CVE-2024-35935: Handle path ref underflow in header iterate_inode_ref() (bsc#1224645)
- CVE-2024-35936: Add missing mutex_unlock in btrfs_relocate_sys_chunks() (bsc#1224644)
- CVE-2024-35944: Fixed memcpy() run-time warning in dg_dispatch_as_host()  (bsc#1224648).
- CVE-2024-35969: Fixed race condition between ipv6_get_ifaddr and ipv6_del_addr  (bsc#1224580).
- CVE-2024-35982: Avoid infinite loop trying to resize local TT  (bsc#1224566)
- CVE-2024-36029: Prevent access to suspended controller (bsc#1225708)
The following non-security bugs were fixed:
- af_unix: annote lockless accesses to unix_tot_inflight & gc_in_progress (bsc#1223384).
- af_unix: Do not use atomic ops for unix_sk(sk)->inflight (bsc#1223384).
- af_unix: Replace BUG_ON() with WARN_ON_ONCE() (bsc#1223384).
- ASoC: tracing: Export SND_SOC_DAPM_DIR_OUT to its value (git-fixes).
- assoc_array: Fix BUG_ON during garbage collect.
- autofs: fix a leak in autofs_expire_indirect() (git-fixes)
- Bluetooth: btusb: Some Qualcomm Bluetooth adapters stop working (git-fixes).
- btrfs: avoid null pointer dereference on fs_info when calling btrfs_crit (git-fixes)
- btrfs: check if root is readonly while setting security xattr (git-fixes)
- btrfs: defrag: use btrfs_mod_outstanding_extents in cluster_pages_for_defrag (git-fixes)
- btrfs: do not get an EINTR during drop_snapshot for reloc (git-fixes)
- btrfs: do not stop integrity writeback too early (git-fixes)
- btrfs: Explicitly handle btrfs_update_root failure (git-fixes)
- btrfs: fail mount when sb flag is not in BTRFS_SUPER_FLAG_SUPP (git-fixes)
- btrfs: fix btrfs_prev_leaf() to not return the same key twice (git-fixes)
- btrfs: fix deadlock when writing out space cache (git-fixes)
- Btrfs: fix incorrect {node,sector}size endianness from BTRFS_IOC_FS_INFO (git-fixes)
- btrfs: fix lockdep splat and potential deadlock after failure running delayed items (git-fixes)
- btrfs: fix lost error handling when looking up extended ref on log replay (git-fixes)
- btrfs: Fix NULL pointer exception in find_bio_stripe (git-fixes)
- btrfs: Fix out of bounds access in btrfs_search_slot (git-fixes)
- btrfs: fix race when deleting quota root from the dirty cow roots list (git-fixes)
- btrfs: fix range_end calculation in extent_write_locked_range (git-fixes)
- btrfs: fix return value mixup in btrfs_get_extent (git-fixes)
- btrfs: fix unaligned access in readdir (git-fixes)
- btrfs: limit device extents to the device size (git-fixes)
- btrfs: prevent to set invalid default subvolid (git-fixes)
- btrfs: record delayed inode root in transaction (git-fixes)
- btrfs: scrub: reject unsupported scrub flags (git-fixes)
- btrfs: send: ensure send_fd is writable (git-fixes)
- btrfs: send: in case of IO error log it (git-fixes)
- btrfs: send: limit number of clones and allocated memory size (git-fixes)
- btrfs: sysfs: use NOFS for device creation (git-fixes) Adjustment: add #include
- btrfs: tree-checker: add missing return after error in root_item (git-fixes)
- btrfs: tree-checker: add missing returns after data_ref alignment checks (git-fixes)
- btrfs: tree-checker: do not error out if extent ref hash does not match (git-fixes)
- btrfs: tree-checker: fix inline ref size in error messages (git-fixes)
- btrfs: tree-checker: Fix misleading group system information (git-fixes)
- btrfs: undo writable superblocke when sprouting fails (git-fixes)
- btrfs: validate qgroup inherit for SNAP_CREATE_V2 ioctl (git-fixes)
- ecryptfs: fix a memory leak bug in ecryptfs_init_messaging() (git-fixes)
- ecryptfs: fix a memory leak bug in parse_tag_1_packet() (git-fixes)
- ecryptfs: fix kernel panic with null dev_name (git-fixes)
- ecryptfs: Fix typo in message (git-fixes)
- ep_create_wakeup_source(): dentry name can change under you (git-fixes)
- exportfs_decode_fh(): negative pinned may become positive without the parent locked (git-fixes)
- fscrypt: clean up some BUG_ON()s in block encryption/decryption (git-fixes)
- fs/proc/proc_sysctl.c: fix the default values of i_uid/i_gid on /proc/sys inodes (git-fixes)
- ila: do not generate empty messages in ila_xlat_nl_cmd_get_mapping() (git-fixes).
- ipv4, ipv6: Fix handling of transhdrlen in __ip{,6}_append_data() (git-fixes).
- kprobes: Fix possible use-after-free issue on kprobe registration (git-fixes).
- KVM: s390: Check kvm pointer when testing KVM_CAP_S390_HPAGE_1M (git-fixes bsc#1225059).
- l2tp: pass correct message length to ip6_append_data (git-fixes).
- lib/mpi: use kcalloc in mpi_resize (git-fixes).
- list: fix a data-race around ep->rdllist (git-fixes).
- livepatch: Fix missing newline character in klp_resolve_symbols() (bsc#1223539).
- mass-cve: Add convenience KBUILD_USER environment variable
- mass-cve: Always use bash in Makefile Some constrcts are just too convenient to leave them in favor of POSIX'd /bin/sh. Switch to explicit bash.
- mass-cve: Fail early without data files curl >$@ would create/update the file even if download fails. Use explicit argument to prevent continuation with empty cve2bugzilla file.
- mass-cve: Fix update detection with packed-refs Per-branch files are thing of the past, git may non-deterministically pack the ref files. Therefore use the timestamp of the whole packed-ref file (better false positive detection of update than breakage or false negative). Add unified approach to read packed-refs regardless of KSOURCE_GIT worktree or not.
- mass-cve: Make BRANCH mandatory
- mass-cve: Use dedicated worktree for reference updates So that any checkout in KSOURCE_GIT is not changed.
- net: 9p: avoid freeing uninit memory in p9pdu_vreadf (git-fixes).
- netfilter: nf_queue: augment nfqa_cfg_policy (git-fixes).
- netfilter: nft_compat: explicitly reject ERROR and standard target (git-fixes).
- netfilter: x_tables: set module owner for icmp(6) matches (git-fixes).
- net/smc: fix fallback failed while sendmsg with fastopen (git-fixes).
- net: tcp: fix unexcepted socket die when snd_wnd is 0 (git-fixes).
- net/tls: Remove the context from the list in tls_device_down (bsc#1221545).
- net: usb: ax88179_178a: stop lying about skb->truesize (git-fixes).
- net: usb: smsc95xx: stop lying about skb->truesize (git-fixes).
- net: usb: sr9700: stop lying about skb->truesize (git-fixes).
- net: vmxnet3: Fix NULL pointer dereference in vmxnet3_rq_rx_complete() (bsc#1223360).
- nfc: change order inside nfc_se_io error path (git-fixes).
- powerpc/pseries/lparcfg: drop error message from guest name lookup (bsc#1187716 ltc#193451 git-fixes).
- ppdev: Add an error check in register_device (git-fixes).
- printk: Disable passing console lock owner completely during panic() (bsc#1197894).
- printk: Update @console_may_schedule in console_trylock_spinning() (bsc#1223969).
- rds: avoid unenecessary cong_update in loop transport (git-fixes).
- rds: ib: Fix missing call to rds_ib_dev_put in rds_ib_setup_qp (git-fixes).
- ring-buffer: Clean ring_buffer_poll_wait() error return (git-fixes).
- ring-buffer: Fix a race between readers and resize checks (bsc#1222893).
- rxrpc: Do not put crypto buffers on the stack (git-fixes).
- rxrpc: Fix a memory leak in rxkad_verify_response() (git-fixes).
- rxrpc: Provide a different lockdep key for call->user_mutex for kernel calls (git-fixes).
- rxrpc: The mutex lock returned by rxrpc_accept_call() needs releasing (git-fixes).
- rxrpc: Work around usercopy check (git-fixes).
- s390/cpum_cf: make crypto counters upward compatible across machine types (bsc#1224347).
- s390/pci: fix max size calculation in zpci_memcpy_toio() (git-fixes bsc#1225062).
- scripts/check-kernel-fix: add -F parameter
- scripts/check-kernel-fix: avoid rechecking child branches when parents are OK Topological sorted dependency tree allows to optimize check-kernel-fixe in cases where parent already has the fix. There is not reason to check branches which merge from that branch as they will get the fix eventually.
- scripts/check-kernel-fix: print a message when no action is needed. Script exits without printing anything about the actions necessary in non-verbose mode. This can be confusing to a beginner user.
- scripts/common-functions: for_each_build_branch traverse branches in dependency topo sorted list
- scripts/common-functions: There are cases where Fixes tag is incorrect. Example would be bsc1223062 comment 3.
- scripts/cve_tools: Update README Issue was fixed in ad3235427c3
- scripts/git_sort/git_sort.py: add rafael/linux-pm.git#linux-next to remotes
- scripts/log2: Fix References: update detection The following change -REferences: git-fixes +REferences: git-fixes bsc#123456 (note the typo in E) will not be detected as a reference update and generates a commit message like 
- scripts/PMU: Always use 12 digits for abbreviated hash references Kernel developers tend to use 12 digits for abbreviated hash references as this is mandatory for upstream work. Enforce this count in PMU for consistency.
- tcp: tcp_make_synack() can be called from process context (git-fixes).
- tls: Fix context leak on tls_device_down (bsc#1221545).
- tracing: Fix blocked reader of snapshot buffer (git-fixes).
- tracing: hide unused ftrace_event_id_fops (git-fixes).
- tracing: Use .flush() call to wake up readers (git-fixes).
- tracing: Use strncpy instead of memcpy when copying comm in trace.c (git-fixes).
- tty/sysrq: replace smp_processor_id() with get_cpu() (bsc#1223540).
- usb: aqc111: stop lying about skb->truesize (git-fixes).
- wifi: cfg80211: avoid leaking stack data into trace (git-fixes).
- wifi: radiotap: fix kernel-doc notation warnings (git-fixes).
    Patchnames
SUSE-2024-2184,SUSE-SLE-HA-12-SP5-2024-2184,SUSE-SLE-Live-Patching-12-SP5-2024-2184,SUSE-SLE-SDK-12-SP5-2024-2184,SUSE-SLE-SERVER-12-SP5-2024-2184,SUSE-SLE-WE-12-SP5-2024-2184
    Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
    {
  "document": {
    "aggregate_severity": {
      "namespace": "https://www.suse.com/support/security/rating/",
      "text": "important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright 2024 SUSE LLC. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Security update for the Linux Kernel",
        "title": "Title of the patch"
      },
      {
        "category": "description",
        "text": "\n\nThe SUSE Linux Enterprise 12 SP5 kernel was updated to receive various security bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2021-46933: Fixed possible underflow in ffs_data_clear() (bsc#1220487).\n- CVE-2021-46955: Fixed an out-of-bounds read with openvswitch, when fragmenting IPv4 packets (bsc#1220513).\n- CVE-2021-47074: Fixed memory leak in nvme_loop_create_ctrl() (bsc#1220854).\n- CVE-2021-47113: Abort btrfs rename_exchange if we fail to insert the second ref (bsc#1221543).\n- CVE-2021-47131: Fixed a use-after-free after the TLS device goes down and up (bsc#1221545).\n- CVE-2021-47206: Check return value after calling  platform_get_resource() (bsc#1222894).\n- CVE-2021-47238: Fixed memory leak in ip_mc_add1_src  (bsc#1224847)\n- CVE-2021-47245: Fixed out of bounds when parsing TCP options  (bsc#1224838)\n- CVE-2021-47246: Fixed page reclaim for dead peer hairpin  (CVE-2021-47246 bsc#1224831).\n- CVE-2021-47249: Fixed memory leak in rds_recvmsg  (bsc#1224880)\n- CVE-2021-47250: Fixed memory leak in netlbl_cipsov4_add_std  (bsc#1224827)\n- CVE-2021-47265: Verify port when creating flow rule (bsc#1224957)\n- CVE-2021-47277: Avoid speculation-based attacks from out-of-range memslot  accesses (bsc#1224960).\n- CVE-2021-47281: Fixed race of snd_seq_timer_open() (bsc#1224983).\n- CVE-2021-47334: Fixed two use after free in ibmasm_init_one  (bsc#1225112).\n- CVE-2021-47352: Add validation for used length (bsc#1225124).\n- CVE-2021-47355: Fixed possible use-after-free in nicstar_cleanup()  (bsc#1225141).\n- CVE-2021-47357: Fixed possible use-after-free in ia_module_exit()  (bsc#1225144).\n- CVE-2021-47361: Fixed error handling in mcb_alloc_bus() (bsc#1225151).\n- CVE-2021-47362: Update intermediate power state for SI (bsc#1225153).\n- CVE-2021-47378: Destroy cm id before destroy qp to avoid use after free (bsc#1225201).\n- CVE-2021-47383: Fixed out-of-bound vmalloc access in imageblit (bsc#1225208).\n- CVE-2021-47397: Break out if skb_header_pointer returns NULL in sctp_rcv_ootb  (bsc#1225082)\n- CVE-2021-47401: Fixed stack information leak (bsc#1225242).\n- CVE-2021-47423: Fixed file release memory leak (bsc#1225366).\n- CVE-2021-47431: Fixed gart.bo pin_count leak (bsc#1225390).\n- CVE-2021-47469: Add SPI fix commit to be ignored (bsc#1225347)\n- CVE-2021-47483: Fixed possible double-free in regcache_rbtree_exit()  (bsc#1224907).\n- CVE-2021-47496: Fix flipped sign in tls_err_abort() calls (bsc#1225354)\n- CVE-2021-47497: Fixed shift-out-of-bound (UBSAN) with byte size cells (bsc#1225355).\n- CVE-2021-47500: Fixed trigger reference couting (bsc#1225360).\n- CVE-2021-47509: Limit the period size to 16MB (bsc#1225409).\n- CVE-2021-47511: Fixed negative period/buffer sizes (bsc#1225411).\n- CVE-2021-47548: Fixed a possible array out-of=bounds (bsc#1225506)\n- CVE-2022-48672: Fixed off-by-one error in unflatten_dt_nodes()  (CVE-2022-48672 bsc#1223931).\n- CVE-2022-48686: Fixed UAF when detecting digest errors (bsc#1223948).\n- CVE-2022-48697: Fixed a use-after-free (bsc#1223922). \n- CVE-2022-48702: Fixed out of bounds access in  snd_emu10k1_pcm_channel_alloc() (bsc#1223923).\n- CVE-2022-48704: Add a force flush to delay work when radeon (bsc#1223932)\n- CVE-2022-48708: Fixed potential NULL dereference (bsc#1224942).\n- CVE-2022-48710: Fixed a possible null pointer dereference (bsc#1225230).\n- CVE-2023-1829: Fixed a use-after-free vulnerability in the control index filter (tcindex) (bsc#1210335).\n- CVE-2023-42755: Check user supplied offsets (bsc#1215702).\n- CVE-2023-52586: Fixed  mutex lock in control vblank irq (bsc#1221081).\n- CVE-2023-52655: Check packet for fixup for true limit (bsc#1217169).\n- CVE-2023-52664: Eliminate double free in error handling logic  (bsc#1224747).\n- CVE-2023-52691: Fixed a double-free in si_dpm_init (bsc#1224607).\n- CVE-2023-52698: Fixed memory leak in netlbl_calipso_add_pass()  (bsc#1224621)\n- CVE-2023-52730: Fixed possible resource leaks in some error paths  (bsc#1224956).\n- CVE-2023-52732: Blocklist the kclient when receiving corrupted snap trace  (bsc#1225222).\n- CVE-2023-52747: Restore allocated resources on failed copyout (bsc#1224931)\n- CVE-2023-52796: Add ipvlan_route_v6_outbound() helper (bsc#1224930).\n- CVE-2023-52821: Fixed a possible null pointer dereference (bsc#1225022).\n- CVE-2023-52864: Fixed opening of char device (bsc#1225132).\n- CVE-2023-52865: Add check for mtk_alloc_clk_data  (bsc#1225086).\n- CVE-2023-52867: Fixed possible buffer overflow (bsc#1225009).\n- CVE-2023-52875: Add check for mtk_alloc_clk_data  (bsc#1225096).\n- CVE-2024-0639: Fixed a denial-of-service vulnerability due to a deadlock found in sctp_auto_asconf_init in net/sctp/socket.c (bsc#1218917).\n- CVE-2024-26625: Call sock_orphan() at release time  (bsc#1221086)\n- CVE-2024-26775: Fixed potential deadlock at set_capacity (bsc#1222627).\n- CVE-2024-26791: Fixed properly validate device names in btrfs (bsc#1222793)\n- CVE-2024-26828: Fixed underflow in parse_server_interfaces() (bsc#1223084).\n- CVE-2024-26846: Do not wait in vain when unloading module  (bsc#1223023).\n- CVE-2024-26874: Fixed a null pointer crash in (bsc#1223048)\n- CVE-2024-26876: Fixed crash on irq during probe (bsc#1223119).\n- CVE-2024-26900: Fixed kmemleak of rdev-\u003eserial (bsc#1223046).\n- CVE-2024-26915: Reset IH OVERFLOW_CLEAR bit (bsc#1223207)\n- CVE-2024-26921: Preserve kabi for sk_buff (bsc#1223138).\n- CVE-2024-26957: Fixed reference counting on zcrypt card objects  (bsc#1223666).\n- CVE-2024-26958: Fixed UAF in direct writes (bsc#1223653).\n- CVE-2024-26984: Fixed instmem race condition around ptr stores (bsc#1223633)\n- CVE-2024-26996: Fixed UAF ncm object at re-bind after usb  ep transport error (bsc#1223752).\n- CVE-2024-27008: Fixed out of bounds access (CVE-2024-27008 bsc#1223802).\n- CVE-2024-27062: Fixed nouveau lock inside client object tree (bsc#1223834).\n- CVE-2024-27396: Fixed Use-After-Free in gtp_dellink (bsc#1224096).\n- CVE-2024-27398: Fixed use-after-free bugs caused by sco_sock_timeout (bsc#1224174).\n- CVE-2024-27401: Fixed user_length taken into account when  fetching packet contents (bsc#1224181).\n- CVE-2024-27419: Fixed data-races around sysctl_net_busy_read  (bsc#1224759)\n- CVE-2024-27436: Stop parsing channels bits when all channels  are found (bsc#1224803).\n- CVE-2024-35789: Check fast rx for non-4addr sta VLAN  changes (bsc#1224749).\n- CVE-2024-35791: Flush pages under kvm-\u003elock to fix UAF in  svm_register_enc_region() (bsc#1224725).\n- CVE-2024-35809: Drain runtime-idle callbacks before driver removal  (bsc#1224738).\n- CVE-2024-35830: Register v4l2 async device only after  successful setup (bsc#1224680).\n- CVE-2024-35849: Fixed information leak in btrfs_ioctl_logical_to_ino()  (bsc#1224733).\n- CVE-2024-35877: Fixed VM_PAT handling in COW mappings (bsc#1224525).\n- CVE-2024-35878: Prevent NULL pointer dereference in vsnprintf()  (bsc#1224671).\n- CVE-2024-35887: Fixed use-after-free bugs caused by ax25_ds_del_timer  (bsc#1224663)\n- CVE-2024-35932: Do not check if plane-\u003estate-\u003efb == state-\u003efb (bsc#1224650).\n- CVE-2024-35935: Handle path ref underflow in header iterate_inode_ref() (bsc#1224645)\n- CVE-2024-35936: Add missing mutex_unlock in btrfs_relocate_sys_chunks() (bsc#1224644)\n- CVE-2024-35944: Fixed memcpy() run-time warning in dg_dispatch_as_host()  (bsc#1224648).\n- CVE-2024-35969: Fixed race condition between ipv6_get_ifaddr and ipv6_del_addr  (bsc#1224580).\n- CVE-2024-35982: Avoid infinite loop trying to resize local TT  (bsc#1224566)\n- CVE-2024-36029: Prevent access to suspended controller (bsc#1225708)\n\nThe following non-security bugs were fixed:\n\n- af_unix: annote lockless accesses to unix_tot_inflight \u0026 gc_in_progress (bsc#1223384).\n- af_unix: Do not use atomic ops for unix_sk(sk)-\u003einflight (bsc#1223384).\n- af_unix: Replace BUG_ON() with WARN_ON_ONCE() (bsc#1223384).\n- ASoC: tracing: Export SND_SOC_DAPM_DIR_OUT to its value (git-fixes).\n- assoc_array: Fix BUG_ON during garbage collect.\n- autofs: fix a leak in autofs_expire_indirect() (git-fixes)\n- Bluetooth: btusb: Some Qualcomm Bluetooth adapters stop working (git-fixes).\n- btrfs: avoid null pointer dereference on fs_info when calling btrfs_crit (git-fixes)\n- btrfs: check if root is readonly while setting security xattr (git-fixes)\n- btrfs: defrag: use btrfs_mod_outstanding_extents in cluster_pages_for_defrag (git-fixes)\n- btrfs: do not get an EINTR during drop_snapshot for reloc (git-fixes)\n- btrfs: do not stop integrity writeback too early (git-fixes)\n- btrfs: Explicitly handle btrfs_update_root failure (git-fixes)\n- btrfs: fail mount when sb flag is not in BTRFS_SUPER_FLAG_SUPP (git-fixes)\n- btrfs: fix btrfs_prev_leaf() to not return the same key twice (git-fixes)\n- btrfs: fix deadlock when writing out space cache (git-fixes)\n- Btrfs: fix incorrect {node,sector}size endianness from BTRFS_IOC_FS_INFO (git-fixes)\n- btrfs: fix lockdep splat and potential deadlock after failure running delayed items (git-fixes)\n- btrfs: fix lost error handling when looking up extended ref on log replay (git-fixes)\n- btrfs: Fix NULL pointer exception in find_bio_stripe (git-fixes)\n- btrfs: Fix out of bounds access in btrfs_search_slot (git-fixes)\n- btrfs: fix race when deleting quota root from the dirty cow roots list (git-fixes)\n- btrfs: fix range_end calculation in extent_write_locked_range (git-fixes)\n- btrfs: fix return value mixup in btrfs_get_extent (git-fixes)\n- btrfs: fix unaligned access in readdir (git-fixes)\n- btrfs: limit device extents to the device size (git-fixes)\n- btrfs: prevent to set invalid default subvolid (git-fixes)\n- btrfs: record delayed inode root in transaction (git-fixes)\n- btrfs: scrub: reject unsupported scrub flags (git-fixes)\n- btrfs: send: ensure send_fd is writable (git-fixes)\n- btrfs: send: in case of IO error log it (git-fixes)\n- btrfs: send: limit number of clones and allocated memory size (git-fixes)\n- btrfs: sysfs: use NOFS for device creation (git-fixes) Adjustment: add #include\n- btrfs: tree-checker: add missing return after error in root_item (git-fixes)\n- btrfs: tree-checker: add missing returns after data_ref alignment checks (git-fixes)\n- btrfs: tree-checker: do not error out if extent ref hash does not match (git-fixes)\n- btrfs: tree-checker: fix inline ref size in error messages (git-fixes)\n- btrfs: tree-checker: Fix misleading group system information (git-fixes)\n- btrfs: undo writable superblocke when sprouting fails (git-fixes)\n- btrfs: validate qgroup inherit for SNAP_CREATE_V2 ioctl (git-fixes)\n- ecryptfs: fix a memory leak bug in ecryptfs_init_messaging() (git-fixes)\n- ecryptfs: fix a memory leak bug in parse_tag_1_packet() (git-fixes)\n- ecryptfs: fix kernel panic with null dev_name (git-fixes)\n- ecryptfs: Fix typo in message (git-fixes)\n- ep_create_wakeup_source(): dentry name can change under you (git-fixes)\n- exportfs_decode_fh(): negative pinned may become positive without the parent locked (git-fixes)\n- fscrypt: clean up some BUG_ON()s in block encryption/decryption (git-fixes)\n- fs/proc/proc_sysctl.c: fix the default values of i_uid/i_gid on /proc/sys inodes (git-fixes)\n- ila: do not generate empty messages in ila_xlat_nl_cmd_get_mapping() (git-fixes).\n- ipv4, ipv6: Fix handling of transhdrlen in __ip{,6}_append_data() (git-fixes).\n- kprobes: Fix possible use-after-free issue on kprobe registration (git-fixes).\n- KVM: s390: Check kvm pointer when testing KVM_CAP_S390_HPAGE_1M (git-fixes bsc#1225059).\n- l2tp: pass correct message length to ip6_append_data (git-fixes).\n- lib/mpi: use kcalloc in mpi_resize (git-fixes).\n- list: fix a data-race around ep-\u003erdllist (git-fixes).\n- livepatch: Fix missing newline character in klp_resolve_symbols() (bsc#1223539).\n- mass-cve: Add convenience KBUILD_USER environment variable\n- mass-cve: Always use bash in Makefile Some constrcts are just too convenient to leave them in favor of POSIX\u0027d /bin/sh. Switch to explicit bash.\n- mass-cve: Fail early without data files curl \u003e$@ would create/update the file even if download fails. Use explicit argument to prevent continuation with empty cve2bugzilla file.\n- mass-cve: Fix update detection with packed-refs Per-branch files are thing of the past, git may non-deterministically pack the ref files. Therefore use the timestamp of the whole packed-ref file (better false positive detection of update than breakage or false negative). Add unified approach to read packed-refs regardless of KSOURCE_GIT worktree or not.\n- mass-cve: Make BRANCH mandatory\n- mass-cve: Use dedicated worktree for reference updates So that any checkout in KSOURCE_GIT is not changed.\n- net: 9p: avoid freeing uninit memory in p9pdu_vreadf (git-fixes).\n- netfilter: nf_queue: augment nfqa_cfg_policy (git-fixes).\n- netfilter: nft_compat: explicitly reject ERROR and standard target (git-fixes).\n- netfilter: x_tables: set module owner for icmp(6) matches (git-fixes).\n- net/smc: fix fallback failed while sendmsg with fastopen (git-fixes).\n- net: tcp: fix unexcepted socket die when snd_wnd is 0 (git-fixes).\n- net/tls: Remove the context from the list in tls_device_down (bsc#1221545).\n- net: usb: ax88179_178a: stop lying about skb-\u003etruesize (git-fixes).\n- net: usb: smsc95xx: stop lying about skb-\u003etruesize (git-fixes).\n- net: usb: sr9700: stop lying about skb-\u003etruesize (git-fixes).\n- net: vmxnet3: Fix NULL pointer dereference in vmxnet3_rq_rx_complete() (bsc#1223360).\n- nfc: change order inside nfc_se_io error path (git-fixes).\n- powerpc/pseries/lparcfg: drop error message from guest name lookup (bsc#1187716 ltc#193451 git-fixes).\n- ppdev: Add an error check in register_device (git-fixes).\n- printk: Disable passing console lock owner completely during panic() (bsc#1197894).\n- printk: Update @console_may_schedule in console_trylock_spinning() (bsc#1223969).\n- rds: avoid unenecessary cong_update in loop transport (git-fixes).\n- rds: ib: Fix missing call to rds_ib_dev_put in rds_ib_setup_qp (git-fixes).\n- ring-buffer: Clean ring_buffer_poll_wait() error return (git-fixes).\n- ring-buffer: Fix a race between readers and resize checks (bsc#1222893).\n- rxrpc: Do not put crypto buffers on the stack (git-fixes).\n- rxrpc: Fix a memory leak in rxkad_verify_response() (git-fixes).\n- rxrpc: Provide a different lockdep key for call-\u003euser_mutex for kernel calls (git-fixes).\n- rxrpc: The mutex lock returned by rxrpc_accept_call() needs releasing (git-fixes).\n- rxrpc: Work around usercopy check (git-fixes).\n- s390/cpum_cf: make crypto counters upward compatible across machine types (bsc#1224347).\n- s390/pci: fix max size calculation in zpci_memcpy_toio() (git-fixes bsc#1225062).\n- scripts/check-kernel-fix: add -F parameter\n- scripts/check-kernel-fix: avoid rechecking child branches when parents are OK Topological sorted dependency tree allows to optimize check-kernel-fixe in cases where parent already has the fix. There is not reason to check branches which merge from that branch as they will get the fix eventually.\n- scripts/check-kernel-fix: print a message when no action is needed. Script exits without printing anything about the actions necessary in non-verbose mode. This can be confusing to a beginner user.\n- scripts/common-functions: for_each_build_branch traverse branches in dependency topo sorted list\n- scripts/common-functions: There are cases where Fixes tag is incorrect. Example would be bsc1223062 comment 3.\n- scripts/cve_tools: Update README Issue was fixed in ad3235427c3\n- scripts/git_sort/git_sort.py: add rafael/linux-pm.git#linux-next to remotes\n- scripts/log2: Fix References: update detection The following change -REferences: git-fixes +REferences: git-fixes bsc#123456 (note the typo in E) will not be detected as a reference update and generates a commit message like \n- scripts/PMU: Always use 12 digits for abbreviated hash references Kernel developers tend to use 12 digits for abbreviated hash references as this is mandatory for upstream work. Enforce this count in PMU for consistency.\n- tcp: tcp_make_synack() can be called from process context (git-fixes).\n- tls: Fix context leak on tls_device_down (bsc#1221545).\n- tracing: Fix blocked reader of snapshot buffer (git-fixes).\n- tracing: hide unused ftrace_event_id_fops (git-fixes).\n- tracing: Use .flush() call to wake up readers (git-fixes).\n- tracing: Use strncpy instead of memcpy when copying comm in trace.c (git-fixes).\n- tty/sysrq: replace smp_processor_id() with get_cpu() (bsc#1223540).\n- usb: aqc111: stop lying about skb-\u003etruesize (git-fixes).\n- wifi: cfg80211: avoid leaking stack data into trace (git-fixes).\n- wifi: radiotap: fix kernel-doc notation warnings (git-fixes).\n",
        "title": "Description of the patch"
      },
      {
        "category": "details",
        "text": "SUSE-2024-2184,SUSE-SLE-HA-12-SP5-2024-2184,SUSE-SLE-Live-Patching-12-SP5-2024-2184,SUSE-SLE-SDK-12-SP5-2024-2184,SUSE-SLE-SERVER-12-SP5-2024-2184,SUSE-SLE-WE-12-SP5-2024-2184",
        "title": "Patchnames"
      },
      {
        "category": "legal_disclaimer",
        "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
        "title": "Terms of use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://www.suse.com/support/security/contact/",
      "name": "SUSE Product Security Team",
      "namespace": "https://www.suse.com/"
    },
    "references": [
      {
        "category": "external",
        "summary": "SUSE ratings",
        "url": "https://www.suse.com/support/security/rating/"
      },
      {
        "category": "self",
        "summary": "URL of this CSAF notice",
        "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2024_2184-1.json"
      },
      {
        "category": "self",
        "summary": "URL for SUSE-SU-2024:2184-1",
        "url": "https://www.suse.com/support/update/announcement/2024/suse-su-20242184-1/"
      },
      {
        "category": "self",
        "summary": "E-Mail link for SUSE-SU-2024:2184-1",
        "url": "https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1065729",
        "url": "https://bugzilla.suse.com/1065729"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1101816",
        "url": "https://bugzilla.suse.com/1101816"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1141539",
        "url": "https://bugzilla.suse.com/1141539"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1181674",
        "url": "https://bugzilla.suse.com/1181674"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1185902",
        "url": "https://bugzilla.suse.com/1185902"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1187716",
        "url": "https://bugzilla.suse.com/1187716"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188616",
        "url": "https://bugzilla.suse.com/1188616"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1190317",
        "url": "https://bugzilla.suse.com/1190317"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1190795",
        "url": "https://bugzilla.suse.com/1190795"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1191452",
        "url": "https://bugzilla.suse.com/1191452"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1194591",
        "url": "https://bugzilla.suse.com/1194591"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1197760",
        "url": "https://bugzilla.suse.com/1197760"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1197894",
        "url": "https://bugzilla.suse.com/1197894"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1203935",
        "url": "https://bugzilla.suse.com/1203935"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1206213",
        "url": "https://bugzilla.suse.com/1206213"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1206646",
        "url": "https://bugzilla.suse.com/1206646"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1207186",
        "url": "https://bugzilla.suse.com/1207186"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1209657",
        "url": "https://bugzilla.suse.com/1209657"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1210335",
        "url": "https://bugzilla.suse.com/1210335"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1215702",
        "url": "https://bugzilla.suse.com/1215702"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1216702",
        "url": "https://bugzilla.suse.com/1216702"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1217169",
        "url": "https://bugzilla.suse.com/1217169"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1217519",
        "url": "https://bugzilla.suse.com/1217519"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1218917",
        "url": "https://bugzilla.suse.com/1218917"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1220487",
        "url": "https://bugzilla.suse.com/1220487"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1220513",
        "url": "https://bugzilla.suse.com/1220513"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1220854",
        "url": "https://bugzilla.suse.com/1220854"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1220928",
        "url": "https://bugzilla.suse.com/1220928"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1221044",
        "url": "https://bugzilla.suse.com/1221044"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1221081",
        "url": "https://bugzilla.suse.com/1221081"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1221086",
        "url": "https://bugzilla.suse.com/1221086"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1221543",
        "url": "https://bugzilla.suse.com/1221543"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1221545",
        "url": "https://bugzilla.suse.com/1221545"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1221816",
        "url": "https://bugzilla.suse.com/1221816"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1221977",
        "url": "https://bugzilla.suse.com/1221977"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1221994",
        "url": "https://bugzilla.suse.com/1221994"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222559",
        "url": "https://bugzilla.suse.com/1222559"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222619",
        "url": "https://bugzilla.suse.com/1222619"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222627",
        "url": "https://bugzilla.suse.com/1222627"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222667",
        "url": "https://bugzilla.suse.com/1222667"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222671",
        "url": "https://bugzilla.suse.com/1222671"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222793",
        "url": "https://bugzilla.suse.com/1222793"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222893",
        "url": "https://bugzilla.suse.com/1222893"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222894",
        "url": "https://bugzilla.suse.com/1222894"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223023",
        "url": "https://bugzilla.suse.com/1223023"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223046",
        "url": "https://bugzilla.suse.com/1223046"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223048",
        "url": "https://bugzilla.suse.com/1223048"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223062",
        "url": "https://bugzilla.suse.com/1223062"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223084",
        "url": "https://bugzilla.suse.com/1223084"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223119",
        "url": "https://bugzilla.suse.com/1223119"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223138",
        "url": "https://bugzilla.suse.com/1223138"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223207",
        "url": "https://bugzilla.suse.com/1223207"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223360",
        "url": "https://bugzilla.suse.com/1223360"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223384",
        "url": "https://bugzilla.suse.com/1223384"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223432",
        "url": "https://bugzilla.suse.com/1223432"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223509",
        "url": "https://bugzilla.suse.com/1223509"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223512",
        "url": "https://bugzilla.suse.com/1223512"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223539",
        "url": "https://bugzilla.suse.com/1223539"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223540",
        "url": "https://bugzilla.suse.com/1223540"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223626",
        "url": "https://bugzilla.suse.com/1223626"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223627",
        "url": "https://bugzilla.suse.com/1223627"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223633",
        "url": "https://bugzilla.suse.com/1223633"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223653",
        "url": "https://bugzilla.suse.com/1223653"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223666",
        "url": "https://bugzilla.suse.com/1223666"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223671",
        "url": "https://bugzilla.suse.com/1223671"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223712",
        "url": "https://bugzilla.suse.com/1223712"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223715",
        "url": "https://bugzilla.suse.com/1223715"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223738",
        "url": "https://bugzilla.suse.com/1223738"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223744",
        "url": "https://bugzilla.suse.com/1223744"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223752",
        "url": "https://bugzilla.suse.com/1223752"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223802",
        "url": "https://bugzilla.suse.com/1223802"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223819",
        "url": "https://bugzilla.suse.com/1223819"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223834",
        "url": "https://bugzilla.suse.com/1223834"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223922",
        "url": "https://bugzilla.suse.com/1223922"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223923",
        "url": "https://bugzilla.suse.com/1223923"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223931",
        "url": "https://bugzilla.suse.com/1223931"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223932",
        "url": "https://bugzilla.suse.com/1223932"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223948",
        "url": "https://bugzilla.suse.com/1223948"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223969",
        "url": "https://bugzilla.suse.com/1223969"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1224096",
        "url": "https://bugzilla.suse.com/1224096"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1224174",
        "url": "https://bugzilla.suse.com/1224174"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1224181",
        "url": "https://bugzilla.suse.com/1224181"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1224347",
        "url": "https://bugzilla.suse.com/1224347"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1224482",
        "url": "https://bugzilla.suse.com/1224482"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1224511",
        "url": "https://bugzilla.suse.com/1224511"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1224525",
        "url": "https://bugzilla.suse.com/1224525"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1224566",
        "url": "https://bugzilla.suse.com/1224566"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1224580",
        "url": "https://bugzilla.suse.com/1224580"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1224592",
        "url": "https://bugzilla.suse.com/1224592"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1224601",
        "url": "https://bugzilla.suse.com/1224601"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1224607",
        "url": "https://bugzilla.suse.com/1224607"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1224621",
        "url": "https://bugzilla.suse.com/1224621"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1224644",
        "url": "https://bugzilla.suse.com/1224644"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1224645",
        "url": "https://bugzilla.suse.com/1224645"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1224648",
        "url": "https://bugzilla.suse.com/1224648"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1224650",
        "url": "https://bugzilla.suse.com/1224650"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1224663",
        "url": "https://bugzilla.suse.com/1224663"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1224671",
        "url": "https://bugzilla.suse.com/1224671"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1224676",
        "url": "https://bugzilla.suse.com/1224676"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1224680",
        "url": "https://bugzilla.suse.com/1224680"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1224682",
        "url": "https://bugzilla.suse.com/1224682"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1224725",
        "url": "https://bugzilla.suse.com/1224725"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1224728",
        "url": "https://bugzilla.suse.com/1224728"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1224733",
        "url": "https://bugzilla.suse.com/1224733"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1224738",
        "url": "https://bugzilla.suse.com/1224738"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1224747",
        "url": "https://bugzilla.suse.com/1224747"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1224749",
        "url": "https://bugzilla.suse.com/1224749"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1224759",
        "url": "https://bugzilla.suse.com/1224759"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1224803",
        "url": "https://bugzilla.suse.com/1224803"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1224827",
        "url": "https://bugzilla.suse.com/1224827"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1224830",
        "url": "https://bugzilla.suse.com/1224830"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1224831",
        "url": "https://bugzilla.suse.com/1224831"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1224834",
        "url": "https://bugzilla.suse.com/1224834"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1224838",
        "url": "https://bugzilla.suse.com/1224838"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1224841",
        "url": "https://bugzilla.suse.com/1224841"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1224844",
        "url": "https://bugzilla.suse.com/1224844"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1224846",
        "url": "https://bugzilla.suse.com/1224846"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1224847",
        "url": "https://bugzilla.suse.com/1224847"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1224849",
        "url": "https://bugzilla.suse.com/1224849"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1224854",
        "url": "https://bugzilla.suse.com/1224854"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1224859",
        "url": "https://bugzilla.suse.com/1224859"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1224867",
        "url": "https://bugzilla.suse.com/1224867"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1224880",
        "url": "https://bugzilla.suse.com/1224880"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1224882",
        "url": "https://bugzilla.suse.com/1224882"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1224888",
        "url": "https://bugzilla.suse.com/1224888"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1224889",
        "url": "https://bugzilla.suse.com/1224889"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1224892",
        "url": "https://bugzilla.suse.com/1224892"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1224893",
        "url": "https://bugzilla.suse.com/1224893"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1224899",
        "url": "https://bugzilla.suse.com/1224899"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1224904",
        "url": "https://bugzilla.suse.com/1224904"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1224907",
        "url": "https://bugzilla.suse.com/1224907"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1224916",
        "url": "https://bugzilla.suse.com/1224916"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1224917",
        "url": "https://bugzilla.suse.com/1224917"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1224922",
        "url": "https://bugzilla.suse.com/1224922"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1224926",
        "url": "https://bugzilla.suse.com/1224926"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1224930",
        "url": "https://bugzilla.suse.com/1224930"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1224931",
        "url": "https://bugzilla.suse.com/1224931"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1224942",
        "url": "https://bugzilla.suse.com/1224942"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1224954",
        "url": "https://bugzilla.suse.com/1224954"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1224956",
        "url": "https://bugzilla.suse.com/1224956"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1224957",
        "url": "https://bugzilla.suse.com/1224957"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1224959",
        "url": "https://bugzilla.suse.com/1224959"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1224960",
        "url": "https://bugzilla.suse.com/1224960"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1224961",
        "url": "https://bugzilla.suse.com/1224961"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1224963",
        "url": "https://bugzilla.suse.com/1224963"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1224966",
        "url": "https://bugzilla.suse.com/1224966"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1224968",
        "url": "https://bugzilla.suse.com/1224968"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1224981",
        "url": "https://bugzilla.suse.com/1224981"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1224982",
        "url": "https://bugzilla.suse.com/1224982"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1224983",
        "url": "https://bugzilla.suse.com/1224983"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1224987",
        "url": "https://bugzilla.suse.com/1224987"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1224990",
        "url": "https://bugzilla.suse.com/1224990"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1224996",
        "url": "https://bugzilla.suse.com/1224996"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1225008",
        "url": "https://bugzilla.suse.com/1225008"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1225009",
        "url": "https://bugzilla.suse.com/1225009"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1225010",
        "url": "https://bugzilla.suse.com/1225010"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1225022",
        "url": "https://bugzilla.suse.com/1225022"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1225026",
        "url": "https://bugzilla.suse.com/1225026"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1225030",
        "url": "https://bugzilla.suse.com/1225030"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1225054",
        "url": "https://bugzilla.suse.com/1225054"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1225058",
        "url": "https://bugzilla.suse.com/1225058"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1225059",
        "url": "https://bugzilla.suse.com/1225059"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1225060",
        "url": "https://bugzilla.suse.com/1225060"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1225062",
        "url": "https://bugzilla.suse.com/1225062"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1225082",
        "url": "https://bugzilla.suse.com/1225082"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1225084",
        "url": "https://bugzilla.suse.com/1225084"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1225086",
        "url": "https://bugzilla.suse.com/1225086"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1225092",
        "url": "https://bugzilla.suse.com/1225092"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1225096",
        "url": "https://bugzilla.suse.com/1225096"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1225112",
        "url": "https://bugzilla.suse.com/1225112"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1225124",
        "url": "https://bugzilla.suse.com/1225124"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1225128",
        "url": "https://bugzilla.suse.com/1225128"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1225132",
        "url": "https://bugzilla.suse.com/1225132"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1225141",
        "url": "https://bugzilla.suse.com/1225141"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1225143",
        "url": "https://bugzilla.suse.com/1225143"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1225144",
        "url": "https://bugzilla.suse.com/1225144"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1225151",
        "url": "https://bugzilla.suse.com/1225151"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1225153",
        "url": "https://bugzilla.suse.com/1225153"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1225155",
        "url": "https://bugzilla.suse.com/1225155"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1225157",
        "url": "https://bugzilla.suse.com/1225157"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1225164",
        "url": "https://bugzilla.suse.com/1225164"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1225177",
        "url": "https://bugzilla.suse.com/1225177"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1225189",
        "url": "https://bugzilla.suse.com/1225189"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1225192",
        "url": "https://bugzilla.suse.com/1225192"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1225193",
        "url": "https://bugzilla.suse.com/1225193"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1225198",
        "url": "https://bugzilla.suse.com/1225198"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1225201",
        "url": "https://bugzilla.suse.com/1225201"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1225207",
        "url": "https://bugzilla.suse.com/1225207"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1225208",
        "url": "https://bugzilla.suse.com/1225208"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1225222",
        "url": "https://bugzilla.suse.com/1225222"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1225230",
        "url": "https://bugzilla.suse.com/1225230"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1225242",
        "url": "https://bugzilla.suse.com/1225242"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1225244",
        "url": "https://bugzilla.suse.com/1225244"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1225247",
        "url": "https://bugzilla.suse.com/1225247"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1225251",
        "url": "https://bugzilla.suse.com/1225251"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1225252",
        "url": "https://bugzilla.suse.com/1225252"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1225256",
        "url": "https://bugzilla.suse.com/1225256"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1225303",
        "url": "https://bugzilla.suse.com/1225303"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1225318",
        "url": "https://bugzilla.suse.com/1225318"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1225322",
        "url": "https://bugzilla.suse.com/1225322"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1225329",
        "url": "https://bugzilla.suse.com/1225329"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1225330",
        "url": "https://bugzilla.suse.com/1225330"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1225336",
        "url": "https://bugzilla.suse.com/1225336"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1225347",
        "url": "https://bugzilla.suse.com/1225347"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1225351",
        "url": "https://bugzilla.suse.com/1225351"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1225354",
        "url": "https://bugzilla.suse.com/1225354"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1225355",
        "url": "https://bugzilla.suse.com/1225355"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1225360",
        "url": "https://bugzilla.suse.com/1225360"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1225366",
        "url": "https://bugzilla.suse.com/1225366"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1225367",
        "url": "https://bugzilla.suse.com/1225367"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1225384",
        "url": "https://bugzilla.suse.com/1225384"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1225390",
        "url": "https://bugzilla.suse.com/1225390"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1225404",
        "url": "https://bugzilla.suse.com/1225404"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1225409",
        "url": "https://bugzilla.suse.com/1225409"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1225411",
        "url": "https://bugzilla.suse.com/1225411"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1225438",
        "url": "https://bugzilla.suse.com/1225438"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1225453",
        "url": "https://bugzilla.suse.com/1225453"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1225479",
        "url": "https://bugzilla.suse.com/1225479"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1225482",
        "url": "https://bugzilla.suse.com/1225482"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1225506",
        "url": "https://bugzilla.suse.com/1225506"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1225549",
        "url": "https://bugzilla.suse.com/1225549"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1225560",
        "url": "https://bugzilla.suse.com/1225560"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1225572",
        "url": "https://bugzilla.suse.com/1225572"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1225640",
        "url": "https://bugzilla.suse.com/1225640"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1225708",
        "url": "https://bugzilla.suse.com/1225708"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1225764",
        "url": "https://bugzilla.suse.com/1225764"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-46933 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-46933/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-46955 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-46955/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47074 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47074/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47113 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47113/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47131 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47131/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47162 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47162/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47171 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47171/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47188 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47188/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47206 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47206/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47220 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47220/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47229 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47229/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47231 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47231/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47235 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47235/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47236 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47236/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47237 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47237/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47238 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47238/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47239 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47239/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47245 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47245/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47246 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47246/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47248 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47248/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47249 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47249/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47250 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47250/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47252 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47252/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47254 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47254/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47258 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47258/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47260 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47260/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47261 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47261/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47265 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47265/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47269 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47269/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47274 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47274/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47276 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47276/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47277 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47277/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47280 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47280/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47281 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47281/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47284 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47284/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47285 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47285/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47288 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47288/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47301 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47301/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47302 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47302/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47305 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47305/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47307 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47307/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47308 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47308/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47310 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47310/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47311 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47311/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47314 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47314/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47315 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47315/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47319 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47319/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47320 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47320/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47321 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47321/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47323 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47323/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47324 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47324/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47330 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47330/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47334 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47334/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47337 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47337/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47343 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47343/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47344 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47344/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47345 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47345/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47347 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47347/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47352 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47352/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47353 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47353/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47355 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47355/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47356 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47356/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47357 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47357/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47361 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47361/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47362 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47362/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47369 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47369/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47375 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47375/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47378 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47378/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47382 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47382/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47383 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47383/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47391 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47391/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47397 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47397/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47400 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47400/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47401 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47401/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47404 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47404/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47409 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47409/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47416 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47416/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47423 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47423/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47424 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47424/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47431 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47431/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47435 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47435/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47436 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47436/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47456 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47456/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47458 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47458/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47460 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47460/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47469 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47469/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47472 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47472/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47473 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47473/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47478 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47478/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47480 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47480/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47483 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47483/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47485 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47485/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47495 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47495/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47496 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47496/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47497 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47497/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47500 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47500/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47506 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47506/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47509 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47509/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47511 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47511/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47523 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47523/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47541 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47541/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47548 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47548/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47565 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47565/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-48636 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-48636/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-48650 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-48650/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-48672 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-48672/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-48686 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-48686/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-48697 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-48697/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-48702 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-48702/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-48704 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-48704/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-48708 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-48708/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-48710 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-48710/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-0160 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-0160/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-1829 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-1829/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-42755 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-42755/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-47233 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-47233/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-52527 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-52527/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-52586 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-52586/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-52591 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-52591/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-52646 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-52646/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-52653 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-52653/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-52655 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-52655/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-52664 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-52664/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-52685 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-52685/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-52686 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-52686/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-52691 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-52691/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-52696 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-52696/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-52698 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-52698/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-52703 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-52703/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-52730 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-52730/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-52732 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-52732/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-52741 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-52741/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-52742 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-52742/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-52747 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-52747/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-52759 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-52759/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-52774 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-52774/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-52781 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-52781/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-52796 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-52796/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-52803 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-52803/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-52821 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-52821/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-52864 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-52864/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-52865 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-52865/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-52867 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-52867/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-52875 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-52875/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-52880 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-52880/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-0639 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-0639/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26625 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26625/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26739 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26739/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26752 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26752/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26775 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26775/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26791 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26791/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26828 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26828/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26846 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26846/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26874 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26874/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26876 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26876/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26900 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26900/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26915 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26915/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26920 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26920/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26921 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26921/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26929 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26929/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26930 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26930/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26931 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26931/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26934 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26934/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26957 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26957/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26958 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26958/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26984 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26984/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26996 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26996/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-27008 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-27008/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-27054 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-27054/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-27059 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-27059/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-27062 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-27062/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-27388 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-27388/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-27396 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-27396/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-27398 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-27398/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-27401 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-27401/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-27419 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-27419/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-27436 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-27436/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-35789 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-35789/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-35791 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-35791/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-35809 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-35809/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-35811 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-35811/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-35830 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-35830/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-35849 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-35849/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-35877 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-35877/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-35878 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-35878/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-35887 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-35887/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-35895 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-35895/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-35914 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-35914/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-35932 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-35932/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-35935 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-35935/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-35936 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-35936/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-35944 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-35944/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-35955 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-35955/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-35969 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-35969/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-35982 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-35982/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-36015 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-36015/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-36029 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-36029/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-36954 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-36954/"
      }
    ],
    "title": "Security update for the Linux Kernel",
    "tracking": {
      "current_release_date": "2024-06-24T18:34:20Z",
      "generator": {
        "date": "2024-06-24T18:34:20Z",
        "engine": {
          "name": "cve-database.git:bin/generate-csaf.pl",
          "version": "1"
        }
      },
      "id": "SUSE-SU-2024:2184-1",
      "initial_release_date": "2024-06-24T18:34:20Z",
      "revision_history": [
        {
          "date": "2024-06-24T18:34:20Z",
          "number": "1",
          "summary": "Current version"
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "cluster-md-kmp-default-4.12.14-122.219.1.aarch64",
                "product": {
                  "name": "cluster-md-kmp-default-4.12.14-122.219.1.aarch64",
                  "product_id": "cluster-md-kmp-default-4.12.14-122.219.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "dlm-kmp-default-4.12.14-122.219.1.aarch64",
                "product": {
                  "name": "dlm-kmp-default-4.12.14-122.219.1.aarch64",
                  "product_id": "dlm-kmp-default-4.12.14-122.219.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "gfs2-kmp-default-4.12.14-122.219.1.aarch64",
                "product": {
                  "name": "gfs2-kmp-default-4.12.14-122.219.1.aarch64",
                  "product_id": "gfs2-kmp-default-4.12.14-122.219.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-4.12.14-122.219.1.aarch64",
                "product": {
                  "name": "kernel-default-4.12.14-122.219.1.aarch64",
                  "product_id": "kernel-default-4.12.14-122.219.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-base-4.12.14-122.219.1.aarch64",
                "product": {
                  "name": "kernel-default-base-4.12.14-122.219.1.aarch64",
                  "product_id": "kernel-default-base-4.12.14-122.219.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-devel-4.12.14-122.219.1.aarch64",
                "product": {
                  "name": "kernel-default-devel-4.12.14-122.219.1.aarch64",
                  "product_id": "kernel-default-devel-4.12.14-122.219.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-extra-4.12.14-122.219.1.aarch64",
                "product": {
                  "name": "kernel-default-extra-4.12.14-122.219.1.aarch64",
                  "product_id": "kernel-default-extra-4.12.14-122.219.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-kgraft-4.12.14-122.219.1.aarch64",
                "product": {
                  "name": "kernel-default-kgraft-4.12.14-122.219.1.aarch64",
                  "product_id": "kernel-default-kgraft-4.12.14-122.219.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-kgraft-devel-4.12.14-122.219.1.aarch64",
                "product": {
                  "name": "kernel-default-kgraft-devel-4.12.14-122.219.1.aarch64",
                  "product_id": "kernel-default-kgraft-devel-4.12.14-122.219.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-build-4.12.14-122.219.1.aarch64",
                "product": {
                  "name": "kernel-obs-build-4.12.14-122.219.1.aarch64",
                  "product_id": "kernel-obs-build-4.12.14-122.219.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-qa-4.12.14-122.219.1.aarch64",
                "product": {
                  "name": "kernel-obs-qa-4.12.14-122.219.1.aarch64",
                  "product_id": "kernel-obs-qa-4.12.14-122.219.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-syms-4.12.14-122.219.1.aarch64",
                "product": {
                  "name": "kernel-syms-4.12.14-122.219.1.aarch64",
                  "product_id": "kernel-syms-4.12.14-122.219.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-4.12.14-122.219.1.aarch64",
                "product": {
                  "name": "kernel-vanilla-4.12.14-122.219.1.aarch64",
                  "product_id": "kernel-vanilla-4.12.14-122.219.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-base-4.12.14-122.219.1.aarch64",
                "product": {
                  "name": "kernel-vanilla-base-4.12.14-122.219.1.aarch64",
                  "product_id": "kernel-vanilla-base-4.12.14-122.219.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-devel-4.12.14-122.219.1.aarch64",
                "product": {
                  "name": "kernel-vanilla-devel-4.12.14-122.219.1.aarch64",
                  "product_id": "kernel-vanilla-devel-4.12.14-122.219.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-kgraft-devel-4.12.14-122.219.1.aarch64",
                "product": {
                  "name": "kernel-vanilla-kgraft-devel-4.12.14-122.219.1.aarch64",
                  "product_id": "kernel-vanilla-kgraft-devel-4.12.14-122.219.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kselftests-kmp-default-4.12.14-122.219.1.aarch64",
                "product": {
                  "name": "kselftests-kmp-default-4.12.14-122.219.1.aarch64",
                  "product_id": "kselftests-kmp-default-4.12.14-122.219.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "ocfs2-kmp-default-4.12.14-122.219.1.aarch64",
                "product": {
                  "name": "ocfs2-kmp-default-4.12.14-122.219.1.aarch64",
                  "product_id": "ocfs2-kmp-default-4.12.14-122.219.1.aarch64"
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-devel-4.12.14-122.219.1.noarch",
                "product": {
                  "name": "kernel-devel-4.12.14-122.219.1.noarch",
                  "product_id": "kernel-devel-4.12.14-122.219.1.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-docs-4.12.14-122.219.1.noarch",
                "product": {
                  "name": "kernel-docs-4.12.14-122.219.1.noarch",
                  "product_id": "kernel-docs-4.12.14-122.219.1.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-docs-html-4.12.14-122.219.1.noarch",
                "product": {
                  "name": "kernel-docs-html-4.12.14-122.219.1.noarch",
                  "product_id": "kernel-docs-html-4.12.14-122.219.1.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-macros-4.12.14-122.219.1.noarch",
                "product": {
                  "name": "kernel-macros-4.12.14-122.219.1.noarch",
                  "product_id": "kernel-macros-4.12.14-122.219.1.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-source-4.12.14-122.219.1.noarch",
                "product": {
                  "name": "kernel-source-4.12.14-122.219.1.noarch",
                  "product_id": "kernel-source-4.12.14-122.219.1.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-source-vanilla-4.12.14-122.219.1.noarch",
                "product": {
                  "name": "kernel-source-vanilla-4.12.14-122.219.1.noarch",
                  "product_id": "kernel-source-vanilla-4.12.14-122.219.1.noarch"
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
                "product": {
                  "name": "cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
                  "product_id": "cluster-md-kmp-default-4.12.14-122.219.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "dlm-kmp-default-4.12.14-122.219.1.ppc64le",
                "product": {
                  "name": "dlm-kmp-default-4.12.14-122.219.1.ppc64le",
                  "product_id": "dlm-kmp-default-4.12.14-122.219.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
                "product": {
                  "name": "gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
                  "product_id": "gfs2-kmp-default-4.12.14-122.219.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-4.12.14-122.219.1.ppc64le",
                "product": {
                  "name": "kernel-debug-4.12.14-122.219.1.ppc64le",
                  "product_id": "kernel-debug-4.12.14-122.219.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-base-4.12.14-122.219.1.ppc64le",
                "product": {
                  "name": "kernel-debug-base-4.12.14-122.219.1.ppc64le",
                  "product_id": "kernel-debug-base-4.12.14-122.219.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-4.12.14-122.219.1.ppc64le",
                "product": {
                  "name": "kernel-debug-devel-4.12.14-122.219.1.ppc64le",
                  "product_id": "kernel-debug-devel-4.12.14-122.219.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-kgraft-devel-4.12.14-122.219.1.ppc64le",
                "product": {
                  "name": "kernel-debug-kgraft-devel-4.12.14-122.219.1.ppc64le",
                  "product_id": "kernel-debug-kgraft-devel-4.12.14-122.219.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-4.12.14-122.219.1.ppc64le",
                "product": {
                  "name": "kernel-default-4.12.14-122.219.1.ppc64le",
                  "product_id": "kernel-default-4.12.14-122.219.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-base-4.12.14-122.219.1.ppc64le",
                "product": {
                  "name": "kernel-default-base-4.12.14-122.219.1.ppc64le",
                  "product_id": "kernel-default-base-4.12.14-122.219.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-devel-4.12.14-122.219.1.ppc64le",
                "product": {
                  "name": "kernel-default-devel-4.12.14-122.219.1.ppc64le",
                  "product_id": "kernel-default-devel-4.12.14-122.219.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-extra-4.12.14-122.219.1.ppc64le",
                "product": {
                  "name": "kernel-default-extra-4.12.14-122.219.1.ppc64le",
                  "product_id": "kernel-default-extra-4.12.14-122.219.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
                "product": {
                  "name": "kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
                  "product_id": "kernel-default-kgraft-4.12.14-122.219.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
                "product": {
                  "name": "kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
                  "product_id": "kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-build-4.12.14-122.219.1.ppc64le",
                "product": {
                  "name": "kernel-obs-build-4.12.14-122.219.1.ppc64le",
                  "product_id": "kernel-obs-build-4.12.14-122.219.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-qa-4.12.14-122.219.1.ppc64le",
                "product": {
                  "name": "kernel-obs-qa-4.12.14-122.219.1.ppc64le",
                  "product_id": "kernel-obs-qa-4.12.14-122.219.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-syms-4.12.14-122.219.1.ppc64le",
                "product": {
                  "name": "kernel-syms-4.12.14-122.219.1.ppc64le",
                  "product_id": "kernel-syms-4.12.14-122.219.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-4.12.14-122.219.1.ppc64le",
                "product": {
                  "name": "kernel-vanilla-4.12.14-122.219.1.ppc64le",
                  "product_id": "kernel-vanilla-4.12.14-122.219.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-base-4.12.14-122.219.1.ppc64le",
                "product": {
                  "name": "kernel-vanilla-base-4.12.14-122.219.1.ppc64le",
                  "product_id": "kernel-vanilla-base-4.12.14-122.219.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-devel-4.12.14-122.219.1.ppc64le",
                "product": {
                  "name": "kernel-vanilla-devel-4.12.14-122.219.1.ppc64le",
                  "product_id": "kernel-vanilla-devel-4.12.14-122.219.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-kgraft-devel-4.12.14-122.219.1.ppc64le",
                "product": {
                  "name": "kernel-vanilla-kgraft-devel-4.12.14-122.219.1.ppc64le",
                  "product_id": "kernel-vanilla-kgraft-devel-4.12.14-122.219.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
                "product": {
                  "name": "kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
                  "product_id": "kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kselftests-kmp-default-4.12.14-122.219.1.ppc64le",
                "product": {
                  "name": "kselftests-kmp-default-4.12.14-122.219.1.ppc64le",
                  "product_id": "kselftests-kmp-default-4.12.14-122.219.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
                "product": {
                  "name": "ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
                  "product_id": "ocfs2-kmp-default-4.12.14-122.219.1.ppc64le"
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "cluster-md-kmp-default-4.12.14-122.219.1.s390x",
                "product": {
                  "name": "cluster-md-kmp-default-4.12.14-122.219.1.s390x",
                  "product_id": "cluster-md-kmp-default-4.12.14-122.219.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "dlm-kmp-default-4.12.14-122.219.1.s390x",
                "product": {
                  "name": "dlm-kmp-default-4.12.14-122.219.1.s390x",
                  "product_id": "dlm-kmp-default-4.12.14-122.219.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "gfs2-kmp-default-4.12.14-122.219.1.s390x",
                "product": {
                  "name": "gfs2-kmp-default-4.12.14-122.219.1.s390x",
                  "product_id": "gfs2-kmp-default-4.12.14-122.219.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-4.12.14-122.219.1.s390x",
                "product": {
                  "name": "kernel-default-4.12.14-122.219.1.s390x",
                  "product_id": "kernel-default-4.12.14-122.219.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-base-4.12.14-122.219.1.s390x",
                "product": {
                  "name": "kernel-default-base-4.12.14-122.219.1.s390x",
                  "product_id": "kernel-default-base-4.12.14-122.219.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-devel-4.12.14-122.219.1.s390x",
                "product": {
                  "name": "kernel-default-devel-4.12.14-122.219.1.s390x",
                  "product_id": "kernel-default-devel-4.12.14-122.219.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-extra-4.12.14-122.219.1.s390x",
                "product": {
                  "name": "kernel-default-extra-4.12.14-122.219.1.s390x",
                  "product_id": "kernel-default-extra-4.12.14-122.219.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-kgraft-4.12.14-122.219.1.s390x",
                "product": {
                  "name": "kernel-default-kgraft-4.12.14-122.219.1.s390x",
                  "product_id": "kernel-default-kgraft-4.12.14-122.219.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
                "product": {
                  "name": "kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
                  "product_id": "kernel-default-kgraft-devel-4.12.14-122.219.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-man-4.12.14-122.219.1.s390x",
                "product": {
                  "name": "kernel-default-man-4.12.14-122.219.1.s390x",
                  "product_id": "kernel-default-man-4.12.14-122.219.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-build-4.12.14-122.219.1.s390x",
                "product": {
                  "name": "kernel-obs-build-4.12.14-122.219.1.s390x",
                  "product_id": "kernel-obs-build-4.12.14-122.219.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-qa-4.12.14-122.219.1.s390x",
                "product": {
                  "name": "kernel-obs-qa-4.12.14-122.219.1.s390x",
                  "product_id": "kernel-obs-qa-4.12.14-122.219.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-syms-4.12.14-122.219.1.s390x",
                "product": {
                  "name": "kernel-syms-4.12.14-122.219.1.s390x",
                  "product_id": "kernel-syms-4.12.14-122.219.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-4.12.14-122.219.1.s390x",
                "product": {
                  "name": "kernel-vanilla-4.12.14-122.219.1.s390x",
                  "product_id": "kernel-vanilla-4.12.14-122.219.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-base-4.12.14-122.219.1.s390x",
                "product": {
                  "name": "kernel-vanilla-base-4.12.14-122.219.1.s390x",
                  "product_id": "kernel-vanilla-base-4.12.14-122.219.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-devel-4.12.14-122.219.1.s390x",
                "product": {
                  "name": "kernel-vanilla-devel-4.12.14-122.219.1.s390x",
                  "product_id": "kernel-vanilla-devel-4.12.14-122.219.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-kgraft-devel-4.12.14-122.219.1.s390x",
                "product": {
                  "name": "kernel-vanilla-kgraft-devel-4.12.14-122.219.1.s390x",
                  "product_id": "kernel-vanilla-kgraft-devel-4.12.14-122.219.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-zfcpdump-4.12.14-122.219.1.s390x",
                "product": {
                  "name": "kernel-zfcpdump-4.12.14-122.219.1.s390x",
                  "product_id": "kernel-zfcpdump-4.12.14-122.219.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-zfcpdump-man-4.12.14-122.219.1.s390x",
                "product": {
                  "name": "kernel-zfcpdump-man-4.12.14-122.219.1.s390x",
                  "product_id": "kernel-zfcpdump-man-4.12.14-122.219.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
                "product": {
                  "name": "kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
                  "product_id": "kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kselftests-kmp-default-4.12.14-122.219.1.s390x",
                "product": {
                  "name": "kselftests-kmp-default-4.12.14-122.219.1.s390x",
                  "product_id": "kselftests-kmp-default-4.12.14-122.219.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "ocfs2-kmp-default-4.12.14-122.219.1.s390x",
                "product": {
                  "name": "ocfs2-kmp-default-4.12.14-122.219.1.s390x",
                  "product_id": "ocfs2-kmp-default-4.12.14-122.219.1.s390x"
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
                "product": {
                  "name": "cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
                  "product_id": "cluster-md-kmp-default-4.12.14-122.219.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "dlm-kmp-default-4.12.14-122.219.1.x86_64",
                "product": {
                  "name": "dlm-kmp-default-4.12.14-122.219.1.x86_64",
                  "product_id": "dlm-kmp-default-4.12.14-122.219.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "gfs2-kmp-default-4.12.14-122.219.1.x86_64",
                "product": {
                  "name": "gfs2-kmp-default-4.12.14-122.219.1.x86_64",
                  "product_id": "gfs2-kmp-default-4.12.14-122.219.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-4.12.14-122.219.1.x86_64",
                "product": {
                  "name": "kernel-debug-4.12.14-122.219.1.x86_64",
                  "product_id": "kernel-debug-4.12.14-122.219.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-base-4.12.14-122.219.1.x86_64",
                "product": {
                  "name": "kernel-debug-base-4.12.14-122.219.1.x86_64",
                  "product_id": "kernel-debug-base-4.12.14-122.219.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-4.12.14-122.219.1.x86_64",
                "product": {
                  "name": "kernel-debug-devel-4.12.14-122.219.1.x86_64",
                  "product_id": "kernel-debug-devel-4.12.14-122.219.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-kgraft-devel-4.12.14-122.219.1.x86_64",
                "product": {
                  "name": "kernel-debug-kgraft-devel-4.12.14-122.219.1.x86_64",
                  "product_id": "kernel-debug-kgraft-devel-4.12.14-122.219.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-4.12.14-122.219.1.x86_64",
                "product": {
                  "name": "kernel-default-4.12.14-122.219.1.x86_64",
                  "product_id": "kernel-default-4.12.14-122.219.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-base-4.12.14-122.219.1.x86_64",
                "product": {
                  "name": "kernel-default-base-4.12.14-122.219.1.x86_64",
                  "product_id": "kernel-default-base-4.12.14-122.219.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-devel-4.12.14-122.219.1.x86_64",
                "product": {
                  "name": "kernel-default-devel-4.12.14-122.219.1.x86_64",
                  "product_id": "kernel-default-devel-4.12.14-122.219.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-extra-4.12.14-122.219.1.x86_64",
                "product": {
                  "name": "kernel-default-extra-4.12.14-122.219.1.x86_64",
                  "product_id": "kernel-default-extra-4.12.14-122.219.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-kgraft-4.12.14-122.219.1.x86_64",
                "product": {
                  "name": "kernel-default-kgraft-4.12.14-122.219.1.x86_64",
                  "product_id": "kernel-default-kgraft-4.12.14-122.219.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
                "product": {
                  "name": "kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
                  "product_id": "kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kvmsmall-4.12.14-122.219.1.x86_64",
                "product": {
                  "name": "kernel-kvmsmall-4.12.14-122.219.1.x86_64",
                  "product_id": "kernel-kvmsmall-4.12.14-122.219.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kvmsmall-base-4.12.14-122.219.1.x86_64",
                "product": {
                  "name": "kernel-kvmsmall-base-4.12.14-122.219.1.x86_64",
                  "product_id": "kernel-kvmsmall-base-4.12.14-122.219.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kvmsmall-devel-4.12.14-122.219.1.x86_64",
                "product": {
                  "name": "kernel-kvmsmall-devel-4.12.14-122.219.1.x86_64",
                  "product_id": "kernel-kvmsmall-devel-4.12.14-122.219.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kvmsmall-kgraft-devel-4.12.14-122.219.1.x86_64",
                "product": {
                  "name": "kernel-kvmsmall-kgraft-devel-4.12.14-122.219.1.x86_64",
                  "product_id": "kernel-kvmsmall-kgraft-devel-4.12.14-122.219.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-build-4.12.14-122.219.1.x86_64",
                "product": {
                  "name": "kernel-obs-build-4.12.14-122.219.1.x86_64",
                  "product_id": "kernel-obs-build-4.12.14-122.219.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-qa-4.12.14-122.219.1.x86_64",
                "product": {
                  "name": "kernel-obs-qa-4.12.14-122.219.1.x86_64",
                  "product_id": "kernel-obs-qa-4.12.14-122.219.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-syms-4.12.14-122.219.1.x86_64",
                "product": {
                  "name": "kernel-syms-4.12.14-122.219.1.x86_64",
                  "product_id": "kernel-syms-4.12.14-122.219.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-4.12.14-122.219.1.x86_64",
                "product": {
                  "name": "kernel-vanilla-4.12.14-122.219.1.x86_64",
                  "product_id": "kernel-vanilla-4.12.14-122.219.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-base-4.12.14-122.219.1.x86_64",
                "product": {
                  "name": "kernel-vanilla-base-4.12.14-122.219.1.x86_64",
                  "product_id": "kernel-vanilla-base-4.12.14-122.219.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-devel-4.12.14-122.219.1.x86_64",
                "product": {
                  "name": "kernel-vanilla-devel-4.12.14-122.219.1.x86_64",
                  "product_id": "kernel-vanilla-devel-4.12.14-122.219.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-kgraft-devel-4.12.14-122.219.1.x86_64",
                "product": {
                  "name": "kernel-vanilla-kgraft-devel-4.12.14-122.219.1.x86_64",
                  "product_id": "kernel-vanilla-kgraft-devel-4.12.14-122.219.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
                "product": {
                  "name": "kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
                  "product_id": "kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kselftests-kmp-default-4.12.14-122.219.1.x86_64",
                "product": {
                  "name": "kselftests-kmp-default-4.12.14-122.219.1.x86_64",
                  "product_id": "kselftests-kmp-default-4.12.14-122.219.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
                "product": {
                  "name": "ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
                  "product_id": "ocfs2-kmp-default-4.12.14-122.219.1.x86_64"
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise High Availability Extension 12 SP5",
                "product": {
                  "name": "SUSE Linux Enterprise High Availability Extension 12 SP5",
                  "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-ha:12:sp5"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Live Patching 12 SP5",
                "product": {
                  "name": "SUSE Linux Enterprise Live Patching 12 SP5",
                  "product_id": "SUSE Linux Enterprise Live Patching 12 SP5",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-live-patching:12:sp5"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Software Development Kit 12 SP5",
                "product": {
                  "name": "SUSE Linux Enterprise Software Development Kit 12 SP5",
                  "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-sdk:12:sp5"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Server 12 SP5",
                "product": {
                  "name": "SUSE Linux Enterprise Server 12 SP5",
                  "product_id": "SUSE Linux Enterprise Server 12 SP5",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sles:12:sp5"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
                "product": {
                  "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
                  "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sles_sap:12:sp5"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Workstation Extension 12 SP5",
                "product": {
                  "name": "SUSE Linux Enterprise Workstation Extension 12 SP5",
                  "product_id": "SUSE Linux Enterprise Workstation Extension 12 SP5",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-we:12:sp5"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "SUSE Linux Enterprise"
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cluster-md-kmp-default-4.12.14-122.219.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP5",
          "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le"
        },
        "product_reference": "cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cluster-md-kmp-default-4.12.14-122.219.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP5",
          "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x"
        },
        "product_reference": "cluster-md-kmp-default-4.12.14-122.219.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cluster-md-kmp-default-4.12.14-122.219.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP5",
          "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64"
        },
        "product_reference": "cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dlm-kmp-default-4.12.14-122.219.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP5",
          "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le"
        },
        "product_reference": "dlm-kmp-default-4.12.14-122.219.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dlm-kmp-default-4.12.14-122.219.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP5",
          "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x"
        },
        "product_reference": "dlm-kmp-default-4.12.14-122.219.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dlm-kmp-default-4.12.14-122.219.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP5",
          "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64"
        },
        "product_reference": "dlm-kmp-default-4.12.14-122.219.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "gfs2-kmp-default-4.12.14-122.219.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP5",
          "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le"
        },
        "product_reference": "gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "gfs2-kmp-default-4.12.14-122.219.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP5",
          "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x"
        },
        "product_reference": "gfs2-kmp-default-4.12.14-122.219.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "gfs2-kmp-default-4.12.14-122.219.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP5",
          "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64"
        },
        "product_reference": "gfs2-kmp-default-4.12.14-122.219.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ocfs2-kmp-default-4.12.14-122.219.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP5",
          "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le"
        },
        "product_reference": "ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ocfs2-kmp-default-4.12.14-122.219.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP5",
          "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x"
        },
        "product_reference": "ocfs2-kmp-default-4.12.14-122.219.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ocfs2-kmp-default-4.12.14-122.219.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP5",
          "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64"
        },
        "product_reference": "ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-kgraft-4.12.14-122.219.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le"
        },
        "product_reference": "kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-kgraft-4.12.14-122.219.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x"
        },
        "product_reference": "kernel-default-kgraft-4.12.14-122.219.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-kgraft-4.12.14-122.219.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64"
        },
        "product_reference": "kernel-default-kgraft-4.12.14-122.219.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le"
        },
        "product_reference": "kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-kgraft-devel-4.12.14-122.219.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x"
        },
        "product_reference": "kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64"
        },
        "product_reference": "kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-docs-4.12.14-122.219.1.noarch as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
          "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch"
        },
        "product_reference": "kernel-docs-4.12.14-122.219.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-obs-build-4.12.14-122.219.1.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
          "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64"
        },
        "product_reference": "kernel-obs-build-4.12.14-122.219.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-obs-build-4.12.14-122.219.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
          "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le"
        },
        "product_reference": "kernel-obs-build-4.12.14-122.219.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-obs-build-4.12.14-122.219.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
          "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x"
        },
        "product_reference": "kernel-obs-build-4.12.14-122.219.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-obs-build-4.12.14-122.219.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
          "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64"
        },
        "product_reference": "kernel-obs-build-4.12.14-122.219.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-4.12.14-122.219.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5",
          "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64"
        },
        "product_reference": "kernel-default-4.12.14-122.219.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-4.12.14-122.219.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5",
          "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le"
        },
        "product_reference": "kernel-default-4.12.14-122.219.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-4.12.14-122.219.1.s390x as component of SUSE Linux Enterprise Server 12 SP5",
          "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x"
        },
        "product_reference": "kernel-default-4.12.14-122.219.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-4.12.14-122.219.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
          "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64"
        },
        "product_reference": "kernel-default-4.12.14-122.219.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-4.12.14-122.219.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5",
          "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64"
        },
        "product_reference": "kernel-default-base-4.12.14-122.219.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-4.12.14-122.219.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5",
          "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le"
        },
        "product_reference": "kernel-default-base-4.12.14-122.219.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-4.12.14-122.219.1.s390x as component of SUSE Linux Enterprise Server 12 SP5",
          "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x"
        },
        "product_reference": "kernel-default-base-4.12.14-122.219.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-4.12.14-122.219.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
          "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64"
        },
        "product_reference": "kernel-default-base-4.12.14-122.219.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-4.12.14-122.219.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5",
          "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64"
        },
        "product_reference": "kernel-default-devel-4.12.14-122.219.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-4.12.14-122.219.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5",
          "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le"
        },
        "product_reference": "kernel-default-devel-4.12.14-122.219.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-4.12.14-122.219.1.s390x as component of SUSE Linux Enterprise Server 12 SP5",
          "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x"
        },
        "product_reference": "kernel-default-devel-4.12.14-122.219.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-4.12.14-122.219.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
          "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64"
        },
        "product_reference": "kernel-default-devel-4.12.14-122.219.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-man-4.12.14-122.219.1.s390x as component of SUSE Linux Enterprise Server 12 SP5",
          "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x"
        },
        "product_reference": "kernel-default-man-4.12.14-122.219.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-4.12.14-122.219.1.noarch as component of SUSE Linux Enterprise Server 12 SP5",
          "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch"
        },
        "product_reference": "kernel-devel-4.12.14-122.219.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-macros-4.12.14-122.219.1.noarch as component of SUSE Linux Enterprise Server 12 SP5",
          "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch"
        },
        "product_reference": "kernel-macros-4.12.14-122.219.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-4.12.14-122.219.1.noarch as component of SUSE Linux Enterprise Server 12 SP5",
          "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch"
        },
        "product_reference": "kernel-source-4.12.14-122.219.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-4.12.14-122.219.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5",
          "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64"
        },
        "product_reference": "kernel-syms-4.12.14-122.219.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-4.12.14-122.219.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5",
          "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le"
        },
        "product_reference": "kernel-syms-4.12.14-122.219.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-4.12.14-122.219.1.s390x as component of SUSE Linux Enterprise Server 12 SP5",
          "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x"
        },
        "product_reference": "kernel-syms-4.12.14-122.219.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-4.12.14-122.219.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
          "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64"
        },
        "product_reference": "kernel-syms-4.12.14-122.219.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-4.12.14-122.219.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64"
        },
        "product_reference": "kernel-default-4.12.14-122.219.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-4.12.14-122.219.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le"
        },
        "product_reference": "kernel-default-4.12.14-122.219.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-4.12.14-122.219.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x"
        },
        "product_reference": "kernel-default-4.12.14-122.219.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-4.12.14-122.219.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64"
        },
        "product_reference": "kernel-default-4.12.14-122.219.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-4.12.14-122.219.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64"
        },
        "product_reference": "kernel-default-base-4.12.14-122.219.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-4.12.14-122.219.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le"
        },
        "product_reference": "kernel-default-base-4.12.14-122.219.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-4.12.14-122.219.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x"
        },
        "product_reference": "kernel-default-base-4.12.14-122.219.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-4.12.14-122.219.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64"
        },
        "product_reference": "kernel-default-base-4.12.14-122.219.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-4.12.14-122.219.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64"
        },
        "product_reference": "kernel-default-devel-4.12.14-122.219.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-4.12.14-122.219.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le"
        },
        "product_reference": "kernel-default-devel-4.12.14-122.219.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-4.12.14-122.219.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x"
        },
        "product_reference": "kernel-default-devel-4.12.14-122.219.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-4.12.14-122.219.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64"
        },
        "product_reference": "kernel-default-devel-4.12.14-122.219.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-man-4.12.14-122.219.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x"
        },
        "product_reference": "kernel-default-man-4.12.14-122.219.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-4.12.14-122.219.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch"
        },
        "product_reference": "kernel-devel-4.12.14-122.219.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-macros-4.12.14-122.219.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch"
        },
        "product_reference": "kernel-macros-4.12.14-122.219.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-4.12.14-122.219.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch"
        },
        "product_reference": "kernel-source-4.12.14-122.219.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-4.12.14-122.219.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64"
        },
        "product_reference": "kernel-syms-4.12.14-122.219.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-4.12.14-122.219.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le"
        },
        "product_reference": "kernel-syms-4.12.14-122.219.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-4.12.14-122.219.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x"
        },
        "product_reference": "kernel-syms-4.12.14-122.219.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-4.12.14-122.219.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64"
        },
        "product_reference": "kernel-syms-4.12.14-122.219.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-extra-4.12.14-122.219.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 12 SP5",
          "product_id": "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
        },
        "product_reference": "kernel-default-extra-4.12.14-122.219.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 12 SP5"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2021-46933",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-46933"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: gadget: f_fs: Clear ffs_eventfd in ffs_data_clear.\n\nffs_data_clear is indirectly called from both ffs_fs_kill_sb and\nffs_ep0_release, so it ends up being called twice when userland closes ep0\nand then unmounts f_fs.\nIf userland provided an eventfd along with function\u0027s USB descriptors, it\nends up calling eventfd_ctx_put as many times, causing a refcount\nunderflow.\nNULL-ify ffs_eventfd to prevent these extraneous eventfd_ctx_put calls.\n\nAlso, set epfiles to NULL right after de-allocating it, for readability.\n\nFor completeness, ffs_data_clear actually ends up being called thrice, the\nlast call being before the whole ffs structure gets freed, so when this\nspecific sequence happens there is a second underflow happening (but not\nbeing reported):\n\n/sys/kernel/debug/tracing# modprobe usb_f_fs\n/sys/kernel/debug/tracing# echo ffs_data_clear \u003e set_ftrace_filter\n/sys/kernel/debug/tracing# echo function \u003e current_tracer\n/sys/kernel/debug/tracing# echo 1 \u003e tracing_on\n(setup gadget, run and kill function userland process, teardown gadget)\n/sys/kernel/debug/tracing# echo 0 \u003e tracing_on\n/sys/kernel/debug/tracing# cat trace\n smartcard-openp-436     [000] .....  1946.208786: ffs_data_clear \u003c-ffs_data_closed\n smartcard-openp-431     [000] .....  1946.279147: ffs_data_clear \u003c-ffs_data_closed\n smartcard-openp-431     [000] .n...  1946.905512: ffs_data_clear \u003c-ffs_data_put\n\nWarning output corresponding to above trace:\n[ 1946.284139] WARNING: CPU: 0 PID: 431 at lib/refcount.c:28 refcount_warn_saturate+0x110/0x15c\n[ 1946.293094] refcount_t: underflow; use-after-free.\n[ 1946.298164] Modules linked in: usb_f_ncm(E) u_ether(E) usb_f_fs(E) hci_uart(E) btqca(E) btrtl(E) btbcm(E) btintel(E) bluetooth(E) nls_ascii(E) nls_cp437(E) vfat(E) fat(E) bcm2835_v4l2(CE) bcm2835_mmal_vchiq(CE) videobuf2_vmalloc(E) videobuf2_memops(E) sha512_generic(E) videobuf2_v4l2(E) sha512_arm(E) videobuf2_common(E) videodev(E) cpufreq_dt(E) snd_bcm2835(CE) brcmfmac(E) mc(E) vc4(E) ctr(E) brcmutil(E) snd_soc_core(E) snd_pcm_dmaengine(E) drbg(E) snd_pcm(E) snd_timer(E) snd(E) soundcore(E) drm_kms_helper(E) cec(E) ansi_cprng(E) rc_core(E) syscopyarea(E) raspberrypi_cpufreq(E) sysfillrect(E) sysimgblt(E) cfg80211(E) max17040_battery(OE) raspberrypi_hwmon(E) fb_sys_fops(E) regmap_i2c(E) ecdh_generic(E) rfkill(E) ecc(E) bcm2835_rng(E) rng_core(E) vchiq(CE) leds_gpio(E) libcomposite(E) fuse(E) configfs(E) ip_tables(E) x_tables(E) autofs4(E) ext4(E) crc16(E) mbcache(E) jbd2(E) crc32c_generic(E) sdhci_iproc(E) sdhci_pltfm(E) sdhci(E)\n[ 1946.399633] CPU: 0 PID: 431 Comm: smartcard-openp Tainted: G         C OE     5.15.0-1-rpi #1  Debian 5.15.3-1\n[ 1946.417950] Hardware name: BCM2835\n[ 1946.425442] Backtrace:\n[ 1946.432048] [\u003cc08d60a0\u003e] (dump_backtrace) from [\u003cc08d62ec\u003e] (show_stack+0x20/0x24)\n[ 1946.448226]  r7:00000009 r6:0000001c r5:c04a948c r4:c0a64e2c\n[ 1946.458412] [\u003cc08d62cc\u003e] (show_stack) from [\u003cc08d9ae0\u003e] (dump_stack+0x28/0x30)\n[ 1946.470380] [\u003cc08d9ab8\u003e] (dump_stack) from [\u003cc0123500\u003e] (__warn+0xe8/0x154)\n[ 1946.482067]  r5:c04a948c r4:c0a71dc8\n[ 1946.490184] [\u003cc0123418\u003e] (__warn) from [\u003cc08d6948\u003e] (warn_slowpath_fmt+0xa0/0xe4)\n[ 1946.506758]  r7:00000009 r6:0000001c r5:c0a71dc8 r4:c0a71e04\n[ 1946.517070] [\u003cc08d68ac\u003e] (warn_slowpath_fmt) from [\u003cc04a948c\u003e] (refcount_warn_saturate+0x110/0x15c)\n[ 1946.535309]  r8:c0100224 r7:c0dfcb84 r6:ffffffff r5:c3b84c00 r4:c24a17c0\n[ 1946.546708] [\u003cc04a937c\u003e] (refcount_warn_saturate) from [\u003cc0380134\u003e] (eventfd_ctx_put+0x48/0x74)\n[ 1946.564476] [\u003cc03800ec\u003e] (eventfd_ctx_put) from [\u003cbf5464e8\u003e] (ffs_data_clear+0xd0/0x118 [usb_f_fs])\n[ 1946.582664]  r5:c3b84c00 r4:c2695b00\n[ 1946.590668] [\u003cbf546418\u003e] (ffs_data_clear [usb_f_fs]) from [\u003cbf547cc0\u003e] (ffs_data_closed+0x9c/0x150 [usb_f_fs])\n[ 1946.609608]  r5:bf54d014 r4:c2695b00\n[ 1946.617522] [\u003cbf547c24\u003e] (ffs_data_closed [usb_f_fs]) from [\u003cbf547da0\u003e] (ffs_fs_kill_sb+0x2c/0x30 [usb_f_fs])\n[ 1946.636217]  r7:c0dfcb\n---truncated---",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-46933",
          "url": "https://www.suse.com/security/cve/CVE-2021-46933"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1220487 for CVE-2021-46933",
          "url": "https://bugzilla.suse.com/1220487"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-24T18:34:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-46933"
    },
    {
      "cve": "CVE-2021-46955",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-46955"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nopenvswitch: fix stack OOB read while fragmenting IPv4 packets\n\nrunning openvswitch on kernels built with KASAN, it\u0027s possible to see the\nfollowing splat while testing fragmentation of IPv4 packets:\n\n BUG: KASAN: stack-out-of-bounds in ip_do_fragment+0x1b03/0x1f60\n Read of size 1 at addr ffff888112fc713c by task handler2/1367\n\n CPU: 0 PID: 1367 Comm: handler2 Not tainted 5.12.0-rc6+ #418\n Hardware name: Red Hat KVM, BIOS 1.11.1-4.module+el8.1.0+4066+0f1aadab 04/01/2014\n Call Trace:\n  dump_stack+0x92/0xc1\n  print_address_description.constprop.7+0x1a/0x150\n  kasan_report.cold.13+0x7f/0x111\n  ip_do_fragment+0x1b03/0x1f60\n  ovs_fragment+0x5bf/0x840 [openvswitch]\n  do_execute_actions+0x1bd5/0x2400 [openvswitch]\n  ovs_execute_actions+0xc8/0x3d0 [openvswitch]\n  ovs_packet_cmd_execute+0xa39/0x1150 [openvswitch]\n  genl_family_rcv_msg_doit.isra.15+0x227/0x2d0\n  genl_rcv_msg+0x287/0x490\n  netlink_rcv_skb+0x120/0x380\n  genl_rcv+0x24/0x40\n  netlink_unicast+0x439/0x630\n  netlink_sendmsg+0x719/0xbf0\n  sock_sendmsg+0xe2/0x110\n  ____sys_sendmsg+0x5ba/0x890\n  ___sys_sendmsg+0xe9/0x160\n  __sys_sendmsg+0xd3/0x170\n  do_syscall_64+0x33/0x40\n  entry_SYSCALL_64_after_hwframe+0x44/0xae\n RIP: 0033:0x7f957079db07\n Code: c3 66 90 41 54 41 89 d4 55 48 89 f5 53 89 fb 48 83 ec 10 e8 eb ec ff ff 44 89 e2 48 89 ee 89 df 41 89 c0 b8 2e 00 00 00 0f 05 \u003c48\u003e 3d 00 f0 ff ff 77 35 44 89 c7 48 89 44 24 08 e8 24 ed ff ff 48\n RSP: 002b:00007f956ce35a50 EFLAGS: 00000293 ORIG_RAX: 000000000000002e\n RAX: ffffffffffffffda RBX: 0000000000000019 RCX: 00007f957079db07\n RDX: 0000000000000000 RSI: 00007f956ce35ae0 RDI: 0000000000000019\n RBP: 00007f956ce35ae0 R08: 0000000000000000 R09: 00007f9558006730\n R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000000\n R13: 00007f956ce37308 R14: 00007f956ce35f80 R15: 00007f956ce35ae0\n\n The buggy address belongs to the page:\n page:00000000af2a1d93 refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x112fc7\n flags: 0x17ffffc0000000()\n raw: 0017ffffc0000000 0000000000000000 dead000000000122 0000000000000000\n raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000\n page dumped because: kasan: bad access detected\n\n addr ffff888112fc713c is located in stack of task handler2/1367 at offset 180 in frame:\n  ovs_fragment+0x0/0x840 [openvswitch]\n\n this frame has 2 objects:\n  [32, 144) \u0027ovs_dst\u0027\n  [192, 424) \u0027ovs_rt\u0027\n\n Memory state around the buggy address:\n  ffff888112fc7000: f3 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00\n  ffff888112fc7080: 00 f1 f1 f1 f1 00 00 00 00 00 00 00 00 00 00 00\n \u003effff888112fc7100: 00 00 00 f2 f2 f2 f2 f2 f2 00 00 00 00 00 00 00\n                                         ^\n  ffff888112fc7180: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00\n  ffff888112fc7200: 00 00 00 00 00 00 f2 f2 f2 00 00 00 00 00 00 00\n\nfor IPv4 packets, ovs_fragment() uses a temporary struct dst_entry. Then,\nin the following call graph:\n\n  ip_do_fragment()\n    ip_skb_dst_mtu()\n      ip_dst_mtu_maybe_forward()\n        ip_mtu_locked()\n\nthe pointer to struct dst_entry is used as pointer to struct rtable: this\nturns the access to struct members like rt_mtu_locked into an OOB read in\nthe stack. Fix this changing the temporary variable used for IPv4 packets\nin ovs_fragment(), similarly to what is done for IPv6 few lines below.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-46955",
          "url": "https://www.suse.com/security/cve/CVE-2021-46955"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1220513 for CVE-2021-46955",
          "url": "https://bugzilla.suse.com/1220513"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1220537 for CVE-2021-46955",
          "url": "https://bugzilla.suse.com/1220537"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-24T18:34:20Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-46955"
    },
    {
      "cve": "CVE-2021-47074",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47074"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnvme-loop: fix memory leak in nvme_loop_create_ctrl()\n\nWhen creating loop ctrl in nvme_loop_create_ctrl(), if nvme_init_ctrl()\nfails, the loop ctrl should be freed before jumping to the \"out\" label.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47074",
          "url": "https://www.suse.com/security/cve/CVE-2021-47074"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1220854 for CVE-2021-47074",
          "url": "https://bugzilla.suse.com/1220854"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-24T18:34:20Z",
          "details": "low"
        }
      ],
      "title": "CVE-2021-47074"
    },
    {
      "cve": "CVE-2021-47113",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47113"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: abort in rename_exchange if we fail to insert the second ref\n\nError injection stress uncovered a problem where we\u0027d leave a dangling\ninode ref if we failed during a rename_exchange.  This happens because\nwe insert the inode ref for one side of the rename, and then for the\nother side.  If this second inode ref insert fails we\u0027ll leave the first\none dangling and leave a corrupt file system behind.  Fix this by\naborting if we did the insert for the first inode ref.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47113",
          "url": "https://www.suse.com/security/cve/CVE-2021-47113"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1221543 for CVE-2021-47113",
          "url": "https://bugzilla.suse.com/1221543"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-24T18:34:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47113"
    },
    {
      "cve": "CVE-2021-47131",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47131"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/tls: Fix use-after-free after the TLS device goes down and up\n\nWhen a netdev with active TLS offload goes down, tls_device_down is\ncalled to stop the offload and tear down the TLS context. However, the\nsocket stays alive, and it still points to the TLS context, which is now\ndeallocated. If a netdev goes up, while the connection is still active,\nand the data flow resumes after a number of TCP retransmissions, it will\nlead to a use-after-free of the TLS context.\n\nThis commit addresses this bug by keeping the context alive until its\nnormal destruction, and implements the necessary fallbacks, so that the\nconnection can resume in software (non-offloaded) kTLS mode.\n\nOn the TX side tls_sw_fallback is used to encrypt all packets. The RX\nside already has all the necessary fallbacks, because receiving\nnon-decrypted packets is supported. The thing needed on the RX side is\nto block resync requests, which are normally produced after receiving\nnon-decrypted packets.\n\nThe necessary synchronization is implemented for a graceful teardown:\nfirst the fallbacks are deployed, then the driver resources are released\n(it used to be possible to have a tls_dev_resync after tls_dev_del).\n\nA new flag called TLS_RX_DEV_DEGRADED is added to indicate the fallback\nmode. It\u0027s used to skip the RX resync logic completely, as it becomes\nuseless, and some objects may be released (for example, resync_async,\nwhich is allocated and freed by the driver).",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47131",
          "url": "https://www.suse.com/security/cve/CVE-2021-47131"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1221545 for CVE-2021-47131",
          "url": "https://bugzilla.suse.com/1221545"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222402 for CVE-2021-47131",
          "url": "https://bugzilla.suse.com/1222402"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-24T18:34:20Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-47131"
    },
    {
      "cve": "CVE-2021-47162",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47162"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntipc: skb_linearize the head skb when reassembling msgs\n\nIt\u0027s not a good idea to append the frag skb to a skb\u0027s frag_list if\nthe frag_list already has skbs from elsewhere, such as this skb was\ncreated by pskb_copy() where the frag_list was cloned (all the skbs\nin it were skb_get\u0027ed) and shared by multiple skbs.\n\nHowever, the new appended frag skb should have been only seen by the\ncurrent skb. Otherwise, it will cause use after free crashes as this\nappended frag skb are seen by multiple skbs but it only got skb_get\ncalled once.\n\nThe same thing happens with a skb updated by pskb_may_pull() with a\nskb_cloned skb. Li Shuang has reported quite a few crashes caused\nby this when doing testing over macvlan devices:\n\n  [] kernel BUG at net/core/skbuff.c:1970!\n  [] Call Trace:\n  []  skb_clone+0x4d/0xb0\n  []  macvlan_broadcast+0xd8/0x160 [macvlan]\n  []  macvlan_process_broadcast+0x148/0x150 [macvlan]\n  []  process_one_work+0x1a7/0x360\n  []  worker_thread+0x30/0x390\n\n  [] kernel BUG at mm/usercopy.c:102!\n  [] Call Trace:\n  []  __check_heap_object+0xd3/0x100\n  []  __check_object_size+0xff/0x16b\n  []  simple_copy_to_iter+0x1c/0x30\n  []  __skb_datagram_iter+0x7d/0x310\n  []  __skb_datagram_iter+0x2a5/0x310\n  []  skb_copy_datagram_iter+0x3b/0x90\n  []  tipc_recvmsg+0x14a/0x3a0 [tipc]\n  []  ____sys_recvmsg+0x91/0x150\n  []  ___sys_recvmsg+0x7b/0xc0\n\n  [] kernel BUG at mm/slub.c:305!\n  [] Call Trace:\n  []  \u003cIRQ\u003e\n  []  kmem_cache_free+0x3ff/0x400\n  []  __netif_receive_skb_core+0x12c/0xc40\n  []  ? kmem_cache_alloc+0x12e/0x270\n  []  netif_receive_skb_internal+0x3d/0xb0\n  []  ? get_rx_page_info+0x8e/0xa0 [be2net]\n  []  be_poll+0x6ef/0xd00 [be2net]\n  []  ? irq_exit+0x4f/0x100\n  []  net_rx_action+0x149/0x3b0\n\n  ...\n\nThis patch is to fix it by linearizing the head skb if it has frag_list\nset in tipc_buf_append(). Note that we choose to do this before calling\nskb_unshare(), as __skb_linearize() will avoid skb_copy(). Also, we can\nnot just drop the frag_list either as the early time.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47162",
          "url": "https://www.suse.com/security/cve/CVE-2021-47162"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1221977 for CVE-2021-47162",
          "url": "https://bugzilla.suse.com/1221977"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-24T18:34:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47162"
    },
    {
      "cve": "CVE-2021-47171",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47171"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: usb: fix memory leak in smsc75xx_bind\n\nSyzbot reported memory leak in smsc75xx_bind().\nThe problem was is non-freed memory in case of\nerrors after memory allocation.\n\nbacktrace:\n  [\u003cffffffff84245b62\u003e] kmalloc include/linux/slab.h:556 [inline]\n  [\u003cffffffff84245b62\u003e] kzalloc include/linux/slab.h:686 [inline]\n  [\u003cffffffff84245b62\u003e] smsc75xx_bind+0x7a/0x334 drivers/net/usb/smsc75xx.c:1460\n  [\u003cffffffff82b5b2e6\u003e] usbnet_probe+0x3b6/0xc30 drivers/net/usb/usbnet.c:1728",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47171",
          "url": "https://www.suse.com/security/cve/CVE-2021-47171"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1221994 for CVE-2021-47171",
          "url": "https://bugzilla.suse.com/1221994"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-24T18:34:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47171"
    },
    {
      "cve": "CVE-2021-47188",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47188"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: ufs: core: Improve SCSI abort handling\n\nThe following has been observed on a test setup:\n\nWARNING: CPU: 4 PID: 250 at drivers/scsi/ufs/ufshcd.c:2737 ufshcd_queuecommand+0x468/0x65c\nCall trace:\n ufshcd_queuecommand+0x468/0x65c\n scsi_send_eh_cmnd+0x224/0x6a0\n scsi_eh_test_devices+0x248/0x418\n scsi_eh_ready_devs+0xc34/0xe58\n scsi_error_handler+0x204/0x80c\n kthread+0x150/0x1b4\n ret_from_fork+0x10/0x30\n\nThat warning is triggered by the following statement:\n\n\tWARN_ON(lrbp-\u003ecmd);\n\nFix this warning by clearing lrbp-\u003ecmd from the abort handler.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47188",
          "url": "https://www.suse.com/security/cve/CVE-2021-47188"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222671 for CVE-2021-47188",
          "url": "https://bugzilla.suse.com/1222671"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-24T18:34:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47188"
    },
    {
      "cve": "CVE-2021-47206",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47206"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: host: ohci-tmio: check return value after calling platform_get_resource()\n\nIt will cause null-ptr-deref if platform_get_resource() returns NULL,\nwe need check the return value.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47206",
          "url": "https://www.suse.com/security/cve/CVE-2021-47206"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222894 for CVE-2021-47206",
          "url": "https://bugzilla.suse.com/1222894"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-24T18:34:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47206"
    },
    {
      "cve": "CVE-2021-47220",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47220"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47220",
          "url": "https://www.suse.com/security/cve/CVE-2021-47220"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1224859 for CVE-2021-47220",
          "url": "https://bugzilla.suse.com/1224859"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-24T18:34:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47220"
    },
    {
      "cve": "CVE-2021-47229",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47229"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nPCI: aardvark: Fix kernel panic during PIO transfer\n\nTrying to start a new PIO transfer by writing value 0 in PIO_START register\nwhen previous transfer has not yet completed (which is indicated by value 1\nin PIO_START) causes an External Abort on CPU, which results in kernel\npanic:\n\n    SError Interrupt on CPU0, code 0xbf000002 -- SError\n    Kernel panic - not syncing: Asynchronous SError Interrupt\n\nTo prevent kernel panic, it is required to reject a new PIO transfer when\nprevious one has not finished yet.\n\nIf previous PIO transfer is not finished yet, the kernel may issue a new\nPIO request only if the previous PIO transfer timed out.\n\nIn the past the root cause of this issue was incorrectly identified (as it\noften happens during link retraining or after link down event) and special\nhack was implemented in Trusted Firmware to catch all SError events in EL3,\nto ignore errors with code 0xbf000002 and not forwarding any other errors\nto kernel and instead throw panic from EL3 Trusted Firmware handler.\n\nLinks to discussion and patches about this issue:\nhttps://git.trustedfirmware.org/TF-A/trusted-firmware-a.git/commit/?id=3c7dcdac5c50\nhttps://lore.kernel.org/linux-pci/20190316161243.29517-1-repk@triplefau.lt/\nhttps://lore.kernel.org/linux-pci/971be151d24312cc533989a64bd454b4@www.loen.fr/\nhttps://review.trustedfirmware.org/c/TF-A/trusted-firmware-a/+/1541\n\nBut the real cause was the fact that during link retraining or after link\ndown event the PIO transfer may take longer time, up to the 1.44s until it\ntimes out. This increased probability that a new PIO transfer would be\nissued by kernel while previous one has not finished yet.\n\nAfter applying this change into the kernel, it is possible to revert the\nmentioned TF-A hack and SError events do not have to be caught in TF-A EL3.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47229",
          "url": "https://www.suse.com/security/cve/CVE-2021-47229"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1224854 for CVE-2021-47229",
          "url": "https://bugzilla.suse.com/1224854"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-24T18:34:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47229"
    },
    {
      "cve": "CVE-2021-47231",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47231"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncan: mcba_usb: fix memory leak in mcba_usb\n\nSyzbot reported memory leak in SocketCAN driver for Microchip CAN BUS\nAnalyzer Tool. The problem was in unfreed usb_coherent.\n\nIn mcba_usb_start() 20 coherent buffers are allocated and there is\nnothing, that frees them:\n\n1) In callback function the urb is resubmitted and that\u0027s all\n2) In disconnect function urbs are simply killed, but URB_FREE_BUFFER\n   is not set (see mcba_usb_start) and this flag cannot be used with\n   coherent buffers.\n\nFail log:\n| [ 1354.053291][ T8413] mcba_usb 1-1:0.0 can0: device disconnected\n| [ 1367.059384][ T8420] kmemleak: 20 new suspected memory leaks (see /sys/kernel/debug/kmem)\n\nSo, all allocated buffers should be freed with usb_free_coherent()\nexplicitly\n\nNOTE:\nThe same pattern for allocating and freeing coherent buffers\nis used in drivers/net/can/usb/kvaser_usb/kvaser_usb_core.c",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47231",
          "url": "https://www.suse.com/security/cve/CVE-2021-47231"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1224849 for CVE-2021-47231",
          "url": "https://bugzilla.suse.com/1224849"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-24T18:34:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47231"
    },
    {
      "cve": "CVE-2021-47235",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47235"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: ethernet: fix potential use-after-free in ec_bhf_remove\n\nstatic void ec_bhf_remove(struct pci_dev *dev)\n{\n...\n\tstruct ec_bhf_priv *priv = netdev_priv(net_dev);\n\n\tunregister_netdev(net_dev);\n\tfree_netdev(net_dev);\n\n\tpci_iounmap(dev, priv-\u003edma_io);\n\tpci_iounmap(dev, priv-\u003eio);\n...\n}\n\npriv is netdev private data, but it is used\nafter free_netdev(). It can cause use-after-free when accessing priv\npointer. So, fix it by moving free_netdev() after pci_iounmap()\ncalls.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47235",
          "url": "https://www.suse.com/security/cve/CVE-2021-47235"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1224844 for CVE-2021-47235",
          "url": "https://bugzilla.suse.com/1224844"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-24T18:34:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47235"
    },
    {
      "cve": "CVE-2021-47236",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47236"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: cdc_eem: fix tx fixup skb leak\n\nwhen usbnet transmit a skb, eem fixup it in eem_tx_fixup(),\nif skb_copy_expand() failed, it return NULL,\nusbnet_start_xmit() will have no chance to free original skb.\n\nfix it by free orginal skb in eem_tx_fixup() first,\nthen check skb clone status, if failed, return NULL to usbnet.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47236",
          "url": "https://www.suse.com/security/cve/CVE-2021-47236"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1224841 for CVE-2021-47236",
          "url": "https://bugzilla.suse.com/1224841"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-24T18:34:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47236"
    },
    {
      "cve": "CVE-2021-47237",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47237"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: hamradio: fix memory leak in mkiss_close\n\nMy local syzbot instance hit memory leak in\nmkiss_open()[1]. The problem was in missing\nfree_netdev() in mkiss_close().\n\nIn mkiss_open() netdevice is allocated and then\nregistered, but in mkiss_close() netdevice was\nonly unregistered, but not freed.\n\nFail log:\n\nBUG: memory leak\nunreferenced object 0xffff8880281ba000 (size 4096):\n  comm \"syz-executor.1\", pid 11443, jiffies 4295046091 (age 17.660s)\n  hex dump (first 32 bytes):\n    61 78 30 00 00 00 00 00 00 00 00 00 00 00 00 00  ax0.............\n    00 27 fa 2a 80 88 ff ff 00 00 00 00 00 00 00 00  .\u0027.*............\n  backtrace:\n    [\u003cffffffff81a27201\u003e] kvmalloc_node+0x61/0xf0\n    [\u003cffffffff8706e7e8\u003e] alloc_netdev_mqs+0x98/0xe80\n    [\u003cffffffff84e64192\u003e] mkiss_open+0xb2/0x6f0 [1]\n    [\u003cffffffff842355db\u003e] tty_ldisc_open+0x9b/0x110\n    [\u003cffffffff84236488\u003e] tty_set_ldisc+0x2e8/0x670\n    [\u003cffffffff8421f7f3\u003e] tty_ioctl+0xda3/0x1440\n    [\u003cffffffff81c9f273\u003e] __x64_sys_ioctl+0x193/0x200\n    [\u003cffffffff8911263a\u003e] do_syscall_64+0x3a/0xb0\n    [\u003cffffffff89200068\u003e] entry_SYSCALL_64_after_hwframe+0x44/0xae\n\nBUG: memory leak\nunreferenced object 0xffff8880141a9a00 (size 96):\n  comm \"syz-executor.1\", pid 11443, jiffies 4295046091 (age 17.660s)\n  hex dump (first 32 bytes):\n    e8 a2 1b 28 80 88 ff ff e8 a2 1b 28 80 88 ff ff  ...(.......(....\n    98 92 9c aa b0 40 02 00 00 00 00 00 00 00 00 00  .....@..........\n  backtrace:\n    [\u003cffffffff8709f68b\u003e] __hw_addr_create_ex+0x5b/0x310\n    [\u003cffffffff8709fb38\u003e] __hw_addr_add_ex+0x1f8/0x2b0\n    [\u003cffffffff870a0c7b\u003e] dev_addr_init+0x10b/0x1f0\n    [\u003cffffffff8706e88b\u003e] alloc_netdev_mqs+0x13b/0xe80\n    [\u003cffffffff84e64192\u003e] mkiss_open+0xb2/0x6f0 [1]\n    [\u003cffffffff842355db\u003e] tty_ldisc_open+0x9b/0x110\n    [\u003cffffffff84236488\u003e] tty_set_ldisc+0x2e8/0x670\n    [\u003cffffffff8421f7f3\u003e] tty_ioctl+0xda3/0x1440\n    [\u003cffffffff81c9f273\u003e] __x64_sys_ioctl+0x193/0x200\n    [\u003cffffffff8911263a\u003e] do_syscall_64+0x3a/0xb0\n    [\u003cffffffff89200068\u003e] entry_SYSCALL_64_after_hwframe+0x44/0xae\n\nBUG: memory leak\nunreferenced object 0xffff8880219bfc00 (size 512):\n  comm \"syz-executor.1\", pid 11443, jiffies 4295046091 (age 17.660s)\n  hex dump (first 32 bytes):\n    00 a0 1b 28 80 88 ff ff 80 8f b1 8d ff ff ff ff  ...(............\n    80 8f b1 8d ff ff ff ff 00 00 00 00 00 00 00 00  ................\n  backtrace:\n    [\u003cffffffff81a27201\u003e] kvmalloc_node+0x61/0xf0\n    [\u003cffffffff8706eec7\u003e] alloc_netdev_mqs+0x777/0xe80\n    [\u003cffffffff84e64192\u003e] mkiss_open+0xb2/0x6f0 [1]\n    [\u003cffffffff842355db\u003e] tty_ldisc_open+0x9b/0x110\n    [\u003cffffffff84236488\u003e] tty_set_ldisc+0x2e8/0x670\n    [\u003cffffffff8421f7f3\u003e] tty_ioctl+0xda3/0x1440\n    [\u003cffffffff81c9f273\u003e] __x64_sys_ioctl+0x193/0x200\n    [\u003cffffffff8911263a\u003e] do_syscall_64+0x3a/0xb0\n    [\u003cffffffff89200068\u003e] entry_SYSCALL_64_after_hwframe+0x44/0xae\n\nBUG: memory leak\nunreferenced object 0xffff888029b2b200 (size 256):\n  comm \"syz-executor.1\", pid 11443, jiffies 4295046091 (age 17.660s)\n  hex dump (first 32 bytes):\n    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................\n    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................\n  backtrace:\n    [\u003cffffffff81a27201\u003e] kvmalloc_node+0x61/0xf0\n    [\u003cffffffff8706f062\u003e] alloc_netdev_mqs+0x912/0xe80\n    [\u003cffffffff84e64192\u003e] mkiss_open+0xb2/0x6f0 [1]\n    [\u003cffffffff842355db\u003e] tty_ldisc_open+0x9b/0x110\n    [\u003cffffffff84236488\u003e] tty_set_ldisc+0x2e8/0x670\n    [\u003cffffffff8421f7f3\u003e] tty_ioctl+0xda3/0x1440\n    [\u003cffffffff81c9f273\u003e] __x64_sys_ioctl+0x193/0x200\n    [\u003cffffffff8911263a\u003e] do_syscall_64+0x3a/0xb0\n    [\u003cffffffff89200068\u003e] entry_SYSCALL_64_after_hwframe+0x44/0xae",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47237",
          "url": "https://www.suse.com/security/cve/CVE-2021-47237"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1224830 for CVE-2021-47237",
          "url": "https://bugzilla.suse.com/1224830"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-24T18:34:20Z",
          "details": "low"
        }
      ],
      "title": "CVE-2021-47237"
    },
    {
      "cve": "CVE-2021-47238",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47238"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: ipv4: fix memory leak in ip_mc_add1_src\n\nBUG: memory leak\nunreferenced object 0xffff888101bc4c00 (size 32):\n  comm \"syz-executor527\", pid 360, jiffies 4294807421 (age 19.329s)\n  hex dump (first 32 bytes):\n    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................\n    01 00 00 00 00 00 00 00 ac 14 14 bb 00 00 02 00 ................\n  backtrace:\n    [\u003c00000000f17c5244\u003e] kmalloc include/linux/slab.h:558 [inline]\n    [\u003c00000000f17c5244\u003e] kzalloc include/linux/slab.h:688 [inline]\n    [\u003c00000000f17c5244\u003e] ip_mc_add1_src net/ipv4/igmp.c:1971 [inline]\n    [\u003c00000000f17c5244\u003e] ip_mc_add_src+0x95f/0xdb0 net/ipv4/igmp.c:2095\n    [\u003c000000001cb99709\u003e] ip_mc_source+0x84c/0xea0 net/ipv4/igmp.c:2416\n    [\u003c0000000052cf19ed\u003e] do_ip_setsockopt net/ipv4/ip_sockglue.c:1294 [inline]\n    [\u003c0000000052cf19ed\u003e] ip_setsockopt+0x114b/0x30c0 net/ipv4/ip_sockglue.c:1423\n    [\u003c00000000477edfbc\u003e] raw_setsockopt+0x13d/0x170 net/ipv4/raw.c:857\n    [\u003c00000000e75ca9bb\u003e] __sys_setsockopt+0x158/0x270 net/socket.c:2117\n    [\u003c00000000bdb993a8\u003e] __do_sys_setsockopt net/socket.c:2128 [inline]\n    [\u003c00000000bdb993a8\u003e] __se_sys_setsockopt net/socket.c:2125 [inline]\n    [\u003c00000000bdb993a8\u003e] __x64_sys_setsockopt+0xba/0x150 net/socket.c:2125\n    [\u003c000000006a1ffdbd\u003e] do_syscall_64+0x40/0x80 arch/x86/entry/common.c:47\n    [\u003c00000000b11467c4\u003e] entry_SYSCALL_64_after_hwframe+0x44/0xae\n\nIn commit 24803f38a5c0 (\"igmp: do not remove igmp souce list info when set\nlink down\"), the ip_mc_clear_src() in ip_mc_destroy_dev() was removed,\nbecause it was also called in igmpv3_clear_delrec().\n\nRough callgraph:\n\ninetdev_destroy\n-\u003e ip_mc_destroy_dev\n     -\u003e igmpv3_clear_delrec\n        -\u003e ip_mc_clear_src\n-\u003e RCU_INIT_POINTER(dev-\u003eip_ptr, NULL)\n\nHowever, ip_mc_clear_src() called in igmpv3_clear_delrec() doesn\u0027t\nrelease in_dev-\u003emc_list-\u003esources. And RCU_INIT_POINTER() assigns the\nNULL to dev-\u003eip_ptr. As a result, in_dev cannot be obtained through\ninetdev_by_index() and then in_dev-\u003emc_list-\u003esources cannot be released\nby ip_mc_del1_src() in the sock_close. Rough call sequence goes like:\n\nsock_close\n-\u003e __sock_release\n   -\u003e inet_release\n      -\u003e ip_mc_drop_socket\n         -\u003e inetdev_by_index\n         -\u003e ip_mc_leave_src\n            -\u003e ip_mc_del_src\n               -\u003e ip_mc_del1_src\n\nSo we still need to call ip_mc_clear_src() in ip_mc_destroy_dev() to free\nin_dev-\u003emc_list-\u003esources.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47238",
          "url": "https://www.suse.com/security/cve/CVE-2021-47238"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1224847 for CVE-2021-47238",
          "url": "https://bugzilla.suse.com/1224847"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-24T18:34:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47238"
    },
    {
      "cve": "CVE-2021-47239",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47239"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: usb: fix possible use-after-free in smsc75xx_bind\n\nThe commit 46a8b29c6306 (\"net: usb: fix memory leak in smsc75xx_bind\")\nfails to clean up the work scheduled in smsc75xx_reset-\u003e\nsmsc75xx_set_multicast, which leads to use-after-free if the work is\nscheduled to start after the deallocation. In addition, this patch\nalso removes a dangling pointer - dev-\u003edata[0].\n\nThis patch calls cancel_work_sync to cancel the scheduled work and set\nthe dangling pointer to NULL.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47239",
          "url": "https://www.suse.com/security/cve/CVE-2021-47239"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1224846 for CVE-2021-47239",
          "url": "https://bugzilla.suse.com/1224846"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-24T18:34:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47239"
    },
    {
      "cve": "CVE-2021-47245",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47245"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: synproxy: Fix out of bounds when parsing TCP options\n\nThe TCP option parser in synproxy (synproxy_parse_options) could read\none byte out of bounds. When the length is 1, the execution flow gets\ninto the loop, reads one byte of the opcode, and if the opcode is\nneither TCPOPT_EOL nor TCPOPT_NOP, it reads one more byte, which exceeds\nthe length of 1.\n\nThis fix is inspired by commit 9609dad263f8 (\"ipv4: tcp_input: fix stack\nout of bounds when parsing TCP options.\").\n\nv2 changes:\n\nAdded an early return when length \u003c 0 to avoid calling\nskb_header_pointer with negative length.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47245",
          "url": "https://www.suse.com/security/cve/CVE-2021-47245"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1224838 for CVE-2021-47245",
          "url": "https://bugzilla.suse.com/1224838"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-24T18:34:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47245"
    },
    {
      "cve": "CVE-2021-47246",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47246"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/mlx5e: Fix page reclaim for dead peer hairpin\n\nWhen adding a hairpin flow, a firmware-side send queue is created for\nthe peer net device, which claims some host memory pages for its\ninternal ring buffer. If the peer net device is removed/unbound before\nthe hairpin flow is deleted, then the send queue is not destroyed which\nleads to a stack trace on pci device remove:\n\n[ 748.005230] mlx5_core 0000:08:00.2: wait_func:1094:(pid 12985): MANAGE_PAGES(0x108) timeout. Will cause a leak of a command resource\n[ 748.005231] mlx5_core 0000:08:00.2: reclaim_pages:514:(pid 12985): failed reclaiming pages: err -110\n[ 748.001835] mlx5_core 0000:08:00.2: mlx5_reclaim_root_pages:653:(pid 12985): failed reclaiming pages (-110) for func id 0x0\n[ 748.002171] ------------[ cut here ]------------\n[ 748.001177] FW pages counter is 4 after reclaiming all pages\n[ 748.001186] WARNING: CPU: 1 PID: 12985 at drivers/net/ethernet/mellanox/mlx5/core/pagealloc.c:685 mlx5_reclaim_startup_pages+0x34b/0x460 [mlx5_core]                      [  +0.002771] Modules linked in: cls_flower mlx5_ib mlx5_core ptp pps_core act_mirred sch_ingress openvswitch nsh xt_conntrack xt_MASQUERADE nf_conntrack_netlink nfnetlink xt_addrtype iptable_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 br_netfilter rpcrdma rdma_ucm ib_iser libiscsi scsi_transport_iscsi rdma_cm ib_umad ib_ipoib iw_cm ib_cm ib_uverbs ib_core overlay fuse [last unloaded: pps_core]\n[ 748.007225] CPU: 1 PID: 12985 Comm: tee Not tainted 5.12.0+ #1\n[ 748.001376] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014\n[ 748.002315] RIP: 0010:mlx5_reclaim_startup_pages+0x34b/0x460 [mlx5_core]\n[ 748.001679] Code: 28 00 00 00 0f 85 22 01 00 00 48 81 c4 b0 00 00 00 31 c0 5b 5d 41 5c 41 5d 41 5e 41 5f c3 48 c7 c7 40 cc 19 a1 e8 9f 71 0e e2 \u003c0f\u003e 0b e9 30 ff ff ff 48 c7 c7 a0 cc 19 a1 e8 8c 71 0e e2 0f 0b e9\n[ 748.003781] RSP: 0018:ffff88815220faf8 EFLAGS: 00010286\n[ 748.001149] RAX: 0000000000000000 RBX: ffff8881b4900280 RCX: 0000000000000000\n[ 748.001445] RDX: 0000000000000027 RSI: 0000000000000004 RDI: ffffed102a441f51\n[ 748.001614] RBP: 00000000000032b9 R08: 0000000000000001 R09: ffffed1054a15ee8\n[ 748.001446] R10: ffff8882a50af73b R11: ffffed1054a15ee7 R12: fffffbfff07c1e30\n[ 748.001447] R13: dffffc0000000000 R14: ffff8881b492cba8 R15: 0000000000000000\n[ 748.001429] FS:  00007f58bd08b580(0000) GS:ffff8882a5080000(0000) knlGS:0000000000000000\n[ 748.001695] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[ 748.001309] CR2: 000055a026351740 CR3: 00000001d3b48006 CR4: 0000000000370ea0\n[ 748.001506] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n[ 748.001483] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\n[ 748.001654] Call Trace:\n[ 748.000576]  ? mlx5_satisfy_startup_pages+0x290/0x290 [mlx5_core]\n[ 748.001416]  ? mlx5_cmd_teardown_hca+0xa2/0xd0 [mlx5_core]\n[ 748.001354]  ? mlx5_cmd_init_hca+0x280/0x280 [mlx5_core]\n[ 748.001203]  mlx5_function_teardown+0x30/0x60 [mlx5_core]\n[ 748.001275]  mlx5_uninit_one+0xa7/0xc0 [mlx5_core]\n[ 748.001200]  remove_one+0x5f/0xc0 [mlx5_core]\n[ 748.001075]  pci_device_remove+0x9f/0x1d0\n[ 748.000833]  device_release_driver_internal+0x1e0/0x490\n[ 748.001207]  unbind_store+0x19f/0x200\n[ 748.000942]  ? sysfs_file_ops+0x170/0x170\n[ 748.001000]  kernfs_fop_write_iter+0x2bc/0x450\n[ 748.000970]  new_sync_write+0x373/0x610\n[ 748.001124]  ? new_sync_read+0x600/0x600\n[ 748.001057]  ? lock_acquire+0x4d6/0x700\n[ 748.000908]  ? lockdep_hardirqs_on_prepare+0x400/0x400\n[ 748.001126]  ? fd_install+0x1c9/0x4d0\n[ 748.000951]  vfs_write+0x4d0/0x800\n[ 748.000804]  ksys_write+0xf9/0x1d0\n[ 748.000868]  ? __x64_sys_read+0xb0/0xb0\n[ 748.000811]  ? filp_open+0x50/0x50\n[ 748.000919]  ? syscall_enter_from_user_mode+0x1d/0x50\n[ 748.001223]  do_syscall_64+0x3f/0x80\n[ 748.000892]  entry_SYSCALL_64_after_hwframe+0x44/0xae\n[ 748.00\n---truncated---",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47246",
          "url": "https://www.suse.com/security/cve/CVE-2021-47246"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1224831 for CVE-2021-47246",
          "url": "https://bugzilla.suse.com/1224831"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-24T18:34:20Z",
          "details": "low"
        }
      ],
      "title": "CVE-2021-47246"
    },
    {
      "cve": "CVE-2021-47248",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47248"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nudp: fix race between close() and udp_abort()\n\nKaustubh reported and diagnosed a panic in udp_lib_lookup().\nThe root cause is udp_abort() racing with close(). Both\nracing functions acquire the socket lock, but udp{v6}_destroy_sock()\nrelease it before performing destructive actions.\n\nWe can\u0027t easily extend the socket lock scope to avoid the race,\ninstead use the SOCK_DEAD flag to prevent udp_abort from doing\nany action when the critical race happens.\n\nDiagnosed-and-tested-by: Kaustubh Pandey \u003ckapandey@codeaurora.org\u003e",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47248",
          "url": "https://www.suse.com/security/cve/CVE-2021-47248"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1224867 for CVE-2021-47248",
          "url": "https://bugzilla.suse.com/1224867"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.8,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-24T18:34:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47248"
    },
    {
      "cve": "CVE-2021-47249",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47249"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: rds: fix memory leak in rds_recvmsg\n\nSyzbot reported memory leak in rds. The problem\nwas in unputted refcount in case of error.\n\nint rds_recvmsg(struct socket *sock, struct msghdr *msg, size_t size,\n\t\tint msg_flags)\n{\n...\n\n\tif (!rds_next_incoming(rs, \u0026inc)) {\n\t\t...\n\t}\n\nAfter this \"if\" inc refcount incremented and\n\n\tif (rds_cmsg_recv(inc, msg, rs)) {\n\t\tret = -EFAULT;\n\t\tgoto out;\n\t}\n...\nout:\n\treturn ret;\n}\n\nin case of rds_cmsg_recv() fail the refcount won\u0027t be\ndecremented. And it\u0027s easy to see from ftrace log, that\nrds_inc_addref() don\u0027t have rds_inc_put() pair in\nrds_recvmsg() after rds_cmsg_recv()\n\n 1)               |  rds_recvmsg() {\n 1)   3.721 us    |    rds_inc_addref();\n 1)   3.853 us    |    rds_message_inc_copy_to_user();\n 1) + 10.395 us   |    rds_cmsg_recv();\n 1) + 34.260 us   |  }",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47249",
          "url": "https://www.suse.com/security/cve/CVE-2021-47249"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1224880 for CVE-2021-47249",
          "url": "https://bugzilla.suse.com/1224880"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-24T18:34:20Z",
          "details": "low"
        }
      ],
      "title": "CVE-2021-47249"
    },
    {
      "cve": "CVE-2021-47250",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47250"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: ipv4: fix memory leak in netlbl_cipsov4_add_std\n\nReported by syzkaller:\nBUG: memory leak\nunreferenced object 0xffff888105df7000 (size 64):\ncomm \"syz-executor842\", pid 360, jiffies 4294824824 (age 22.546s)\nhex dump (first 32 bytes):\n00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................\n00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................\nbacktrace:\n[\u003c00000000e67ed558\u003e] kmalloc include/linux/slab.h:590 [inline]\n[\u003c00000000e67ed558\u003e] kzalloc include/linux/slab.h:720 [inline]\n[\u003c00000000e67ed558\u003e] netlbl_cipsov4_add_std net/netlabel/netlabel_cipso_v4.c:145 [inline]\n[\u003c00000000e67ed558\u003e] netlbl_cipsov4_add+0x390/0x2340 net/netlabel/netlabel_cipso_v4.c:416\n[\u003c0000000006040154\u003e] genl_family_rcv_msg_doit.isra.0+0x20e/0x320 net/netlink/genetlink.c:739\n[\u003c00000000204d7a1c\u003e] genl_family_rcv_msg net/netlink/genetlink.c:783 [inline]\n[\u003c00000000204d7a1c\u003e] genl_rcv_msg+0x2bf/0x4f0 net/netlink/genetlink.c:800\n[\u003c00000000c0d6a995\u003e] netlink_rcv_skb+0x134/0x3d0 net/netlink/af_netlink.c:2504\n[\u003c00000000d78b9d2c\u003e] genl_rcv+0x24/0x40 net/netlink/genetlink.c:811\n[\u003c000000009733081b\u003e] netlink_unicast_kernel net/netlink/af_netlink.c:1314 [inline]\n[\u003c000000009733081b\u003e] netlink_unicast+0x4a0/0x6a0 net/netlink/af_netlink.c:1340\n[\u003c00000000d5fd43b8\u003e] netlink_sendmsg+0x789/0xc70 net/netlink/af_netlink.c:1929\n[\u003c000000000a2d1e40\u003e] sock_sendmsg_nosec net/socket.c:654 [inline]\n[\u003c000000000a2d1e40\u003e] sock_sendmsg+0x139/0x170 net/socket.c:674\n[\u003c00000000321d1969\u003e] ____sys_sendmsg+0x658/0x7d0 net/socket.c:2350\n[\u003c00000000964e16bc\u003e] ___sys_sendmsg+0xf8/0x170 net/socket.c:2404\n[\u003c000000001615e288\u003e] __sys_sendmsg+0xd3/0x190 net/socket.c:2433\n[\u003c000000004ee8b6a5\u003e] do_syscall_64+0x37/0x90 arch/x86/entry/common.c:47\n[\u003c00000000171c7cee\u003e] entry_SYSCALL_64_after_hwframe+0x44/0xae\n\nThe memory of doi_def-\u003emap.std pointing is allocated in\nnetlbl_cipsov4_add_std, but no place has freed it. It should be\nfreed in cipso_v4_doi_free which frees the cipso DOI resource.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47250",
          "url": "https://www.suse.com/security/cve/CVE-2021-47250"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1224827 for CVE-2021-47250",
          "url": "https://bugzilla.suse.com/1224827"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-24T18:34:20Z",
          "details": "low"
        }
      ],
      "title": "CVE-2021-47250"
    },
    {
      "cve": "CVE-2021-47252",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47252"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbatman-adv: Avoid WARN_ON timing related checks\n\nThe soft/batadv interface for a queued OGM can be changed during the time\nthe OGM was queued for transmission and when the OGM is actually\ntransmitted by the worker.\n\nBut WARN_ON must be used to denote kernel bugs and not to print simple\nwarnings. A warning can simply be printed using pr_warn.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47252",
          "url": "https://www.suse.com/security/cve/CVE-2021-47252"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1224882 for CVE-2021-47252",
          "url": "https://bugzilla.suse.com/1224882"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 0,
            "baseSeverity": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-24T18:34:20Z",
          "details": "low"
        }
      ],
      "title": "CVE-2021-47252"
    },
    {
      "cve": "CVE-2021-47254",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47254"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ngfs2: Fix use-after-free in gfs2_glock_shrink_scan\n\nThe GLF_LRU flag is checked under lru_lock in gfs2_glock_remove_from_lru() to\nremove the glock from the lru list in __gfs2_glock_put().\n\nOn the shrink scan path, the same flag is cleared under lru_lock but because\nof cond_resched_lock(\u0026lru_lock) in gfs2_dispose_glock_lru(), progress on the\nput side can be made without deleting the glock from the lru list.\n\nKeep GLF_LRU across the race window opened by cond_resched_lock(\u0026lru_lock) to\nensure correct behavior on both sides - clear GLF_LRU after list_del under\nlru_lock.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47254",
          "url": "https://www.suse.com/security/cve/CVE-2021-47254"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1224888 for CVE-2021-47254",
          "url": "https://bugzilla.suse.com/1224888"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1227559 for CVE-2021-47254",
          "url": "https://bugzilla.suse.com/1227559"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-24T18:34:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47254"
    },
    {
      "cve": "CVE-2021-47258",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47258"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: core: Fix error handling of scsi_host_alloc()\n\nAfter device is initialized via device_initialize(), or its name is set via\ndev_set_name(), the device has to be freed via put_device().  Otherwise\ndevice name will be leaked because it is allocated dynamically in\ndev_set_name().\n\nFix the leak by replacing kfree() with put_device(). Since\nscsi_host_dev_release() properly handles IDA and kthread removal, remove\nspecial-casing these from the error handling as well.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47258",
          "url": "https://www.suse.com/security/cve/CVE-2021-47258"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1224899 for CVE-2021-47258",
          "url": "https://bugzilla.suse.com/1224899"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-24T18:34:20Z",
          "details": "low"
        }
      ],
      "title": "CVE-2021-47258"
    },
    {
      "cve": "CVE-2021-47260",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47260"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nNFS: Fix a potential NULL dereference in nfs_get_client()\n\nNone of the callers are expecting NULL returns from nfs_get_client() so\nthis code will lead to an Oops.  It\u0027s better to return an error\npointer.  I expect that this is dead code so hopefully no one is\naffected.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47260",
          "url": "https://www.suse.com/security/cve/CVE-2021-47260"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1224834 for CVE-2021-47260",
          "url": "https://bugzilla.suse.com/1224834"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-24T18:34:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47260"
    },
    {
      "cve": "CVE-2021-47261",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47261"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nIB/mlx5: Fix initializing CQ fragments buffer\n\nThe function init_cq_frag_buf() can be called to initialize the current CQ\nfragments buffer cq-\u003ebuf, or the temporary cq-\u003eresize_buf that is filled\nduring CQ resize operation.\n\nHowever, the offending commit started to use function get_cqe() for\ngetting the CQEs, the issue with this change is that get_cqe() always\nreturns CQEs from cq-\u003ebuf, which leads us to initialize the wrong buffer,\nand in case of enlarging the CQ we try to access elements beyond the size\nof the current cq-\u003ebuf and eventually hit a kernel panic.\n\n [exception RIP: init_cq_frag_buf+103]\n  [ffff9f799ddcbcd8] mlx5_ib_resize_cq at ffffffffc0835d60 [mlx5_ib]\n  [ffff9f799ddcbdb0] ib_resize_cq at ffffffffc05270df [ib_core]\n  [ffff9f799ddcbdc0] llt_rdma_setup_qp at ffffffffc0a6a712 [llt]\n  [ffff9f799ddcbe10] llt_rdma_cc_event_action at ffffffffc0a6b411 [llt]\n  [ffff9f799ddcbe98] llt_rdma_client_conn_thread at ffffffffc0a6bb75 [llt]\n  [ffff9f799ddcbec8] kthread at ffffffffa66c5da1\n  [ffff9f799ddcbf50] ret_from_fork_nospec_begin at ffffffffa6d95ddd\n\nFix it by getting the needed CQE by calling mlx5_frag_buf_get_wqe() that\ntakes the correct source buffer as a parameter.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47261",
          "url": "https://www.suse.com/security/cve/CVE-2021-47261"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1224954 for CVE-2021-47261",
          "url": "https://bugzilla.suse.com/1224954"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1227751 for CVE-2021-47261",
          "url": "https://bugzilla.suse.com/1227751"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-24T18:34:20Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-47261"
    },
    {
      "cve": "CVE-2021-47265",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47265"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA: Verify port when creating flow rule\n\nValidate port value provided by the user and with that remove no longer\nneeded validation by the driver.  The missing check in the mlx5_ib driver\ncould cause to the below oops.\n\nCall trace:\n  _create_flow_rule+0x2d4/0xf28 [mlx5_ib]\n  mlx5_ib_create_flow+0x2d0/0x5b0 [mlx5_ib]\n  ib_uverbs_ex_create_flow+0x4cc/0x624 [ib_uverbs]\n  ib_uverbs_handler_UVERBS_METHOD_INVOKE_WRITE+0xd4/0x150 [ib_uverbs]\n  ib_uverbs_cmd_verbs.isra.7+0xb28/0xc50 [ib_uverbs]\n  ib_uverbs_ioctl+0x158/0x1d0 [ib_uverbs]\n  do_vfs_ioctl+0xd0/0xaf0\n  ksys_ioctl+0x84/0xb4\n  __arm64_sys_ioctl+0x28/0xc4\n  el0_svc_common.constprop.3+0xa4/0x254\n  el0_svc_handler+0x84/0xa0\n  el0_svc+0x10/0x26c\n Code: b9401260 f9615681 51000400 8b001c20 (f9403c1a)",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47265",
          "url": "https://www.suse.com/security/cve/CVE-2021-47265"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1224957 for CVE-2021-47265",
          "url": "https://bugzilla.suse.com/1224957"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-24T18:34:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47265"
    },
    {
      "cve": "CVE-2021-47269",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47269"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: dwc3: ep0: fix NULL pointer exception\n\nThere is no validation of the index from dwc3_wIndex_to_dep() and we might\nbe referring a non-existing ep and trigger a NULL pointer exception. In\ncertain configurations we might use fewer eps and the index might wrongly\nindicate a larger ep index than existing.\n\nBy adding this validation from the patch we can actually report a wrong\nindex back to the caller.\n\nIn our usecase we are using a composite device on an older kernel, but\nupstream might use this fix also. Unfortunately, I cannot describe the\nhardware for others to reproduce the issue as it is a proprietary\nimplementation.\n\n[   82.958261] Unable to handle kernel NULL pointer dereference at virtual address 00000000000000a4\n[   82.966891] Mem abort info:\n[   82.969663]   ESR = 0x96000006\n[   82.972703]   Exception class = DABT (current EL), IL = 32 bits\n[   82.978603]   SET = 0, FnV = 0\n[   82.981642]   EA = 0, S1PTW = 0\n[   82.984765] Data abort info:\n[   82.987631]   ISV = 0, ISS = 0x00000006\n[   82.991449]   CM = 0, WnR = 0\n[   82.994409] user pgtable: 4k pages, 39-bit VAs, pgdp = 00000000c6210ccc\n[   83.000999] [00000000000000a4] pgd=0000000053aa5003, pud=0000000053aa5003, pmd=0000000000000000\n[   83.009685] Internal error: Oops: 96000006 [#1] PREEMPT SMP\n[   83.026433] Process irq/62-dwc3 (pid: 303, stack limit = 0x000000003985154c)\n[   83.033470] CPU: 0 PID: 303 Comm: irq/62-dwc3 Not tainted 4.19.124 #1\n[   83.044836] pstate: 60000085 (nZCv daIf -PAN -UAO)\n[   83.049628] pc : dwc3_ep0_handle_feature+0x414/0x43c\n[   83.054558] lr : dwc3_ep0_interrupt+0x3b4/0xc94\n\n...\n\n[   83.141788] Call trace:\n[   83.144227]  dwc3_ep0_handle_feature+0x414/0x43c\n[   83.148823]  dwc3_ep0_interrupt+0x3b4/0xc94\n[   83.181546] ---[ end trace aac6b5267d84c32f ]---",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47269",
          "url": "https://www.suse.com/security/cve/CVE-2021-47269"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1224996 for CVE-2021-47269",
          "url": "https://bugzilla.suse.com/1224996"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-24T18:34:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47269"
    },
    {
      "cve": "CVE-2021-47274",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47274"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntracing: Correct the length check which causes memory corruption\n\nWe\u0027ve suffered from severe kernel crashes due to memory corruption on\nour production environment, like,\n\nCall Trace:\n[1640542.554277] general protection fault: 0000 [#1] SMP PTI\n[1640542.554856] CPU: 17 PID: 26996 Comm: python Kdump: loaded Tainted:G\n[1640542.556629] RIP: 0010:kmem_cache_alloc+0x90/0x190\n[1640542.559074] RSP: 0018:ffffb16faa597df8 EFLAGS: 00010286\n[1640542.559587] RAX: 0000000000000000 RBX: 0000000000400200 RCX:\n0000000006e931bf\n[1640542.560323] RDX: 0000000006e931be RSI: 0000000000400200 RDI:\nffff9a45ff004300\n[1640542.560996] RBP: 0000000000400200 R08: 0000000000023420 R09:\n0000000000000000\n[1640542.561670] R10: 0000000000000000 R11: 0000000000000000 R12:\nffffffff9a20608d\n[1640542.562366] R13: ffff9a45ff004300 R14: ffff9a45ff004300 R15:\n696c662f65636976\n[1640542.563128] FS:  00007f45d7c6f740(0000) GS:ffff9a45ff840000(0000)\nknlGS:0000000000000000\n[1640542.563937] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[1640542.564557] CR2: 00007f45d71311a0 CR3: 000000189d63e004 CR4:\n00000000003606e0\n[1640542.565279] DR0: 0000000000000000 DR1: 0000000000000000 DR2:\n0000000000000000\n[1640542.566069] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7:\n0000000000000400\n[1640542.566742] Call Trace:\n[1640542.567009]  anon_vma_clone+0x5d/0x170\n[1640542.567417]  __split_vma+0x91/0x1a0\n[1640542.567777]  do_munmap+0x2c6/0x320\n[1640542.568128]  vm_munmap+0x54/0x70\n[1640542.569990]  __x64_sys_munmap+0x22/0x30\n[1640542.572005]  do_syscall_64+0x5b/0x1b0\n[1640542.573724]  entry_SYSCALL_64_after_hwframe+0x44/0xa9\n[1640542.575642] RIP: 0033:0x7f45d6e61e27\n\nJames Wang has reproduced it stably on the latest 4.19 LTS.\nAfter some debugging, we finally proved that it\u0027s due to ftrace\nbuffer out-of-bound access using a debug tool as follows:\n[   86.775200] BUG: Out-of-bounds write at addr 0xffff88aefe8b7000\n[   86.780806]  no_context+0xdf/0x3c0\n[   86.784327]  __do_page_fault+0x252/0x470\n[   86.788367]  do_page_fault+0x32/0x140\n[   86.792145]  page_fault+0x1e/0x30\n[   86.795576]  strncpy_from_unsafe+0x66/0xb0\n[   86.799789]  fetch_memory_string+0x25/0x40\n[   86.804002]  fetch_deref_string+0x51/0x60\n[   86.808134]  kprobe_trace_func+0x32d/0x3a0\n[   86.812347]  kprobe_dispatcher+0x45/0x50\n[   86.816385]  kprobe_ftrace_handler+0x90/0xf0\n[   86.820779]  ftrace_ops_assist_func+0xa1/0x140\n[   86.825340]  0xffffffffc00750bf\n[   86.828603]  do_sys_open+0x5/0x1f0\n[   86.832124]  do_syscall_64+0x5b/0x1b0\n[   86.835900]  entry_SYSCALL_64_after_hwframe+0x44/0xa9\n\ncommit b220c049d519 (\"tracing: Check length before giving out\nthe filter buffer\") adds length check to protect trace data\noverflow introduced in 0fc1b09ff1ff, seems that this fix can\u0027t prevent\noverflow entirely, the length check should also take the sizeof\nentry-\u003earray[0] into account, since this array[0] is filled the\nlength of trace data and occupy addtional space and risk overflow.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47274",
          "url": "https://www.suse.com/security/cve/CVE-2021-47274"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1224990 for CVE-2021-47274",
          "url": "https://bugzilla.suse.com/1224990"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-24T18:34:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47274"
    },
    {
      "cve": "CVE-2021-47276",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47276"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nftrace: Do not blindly read the ip address in ftrace_bug()\n\nIt was reported that a bug on arm64 caused a bad ip address to be used for\nupdating into a nop in ftrace_init(), but the error path (rightfully)\nreturned -EINVAL and not -EFAULT, as the bug caused more than one error to\noccur. But because -EINVAL was returned, the ftrace_bug() tried to report\nwhat was at the location of the ip address, and read it directly. This\ncaused the machine to panic, as the ip was not pointing to a valid memory\naddress.\n\nInstead, read the ip address with copy_from_kernel_nofault() to safely\naccess the memory, and if it faults, report that the address faulted,\notherwise report what was in that location.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47276",
          "url": "https://www.suse.com/security/cve/CVE-2021-47276"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1224966 for CVE-2021-47276",
          "url": "https://bugzilla.suse.com/1224966"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-24T18:34:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47276"
    },
    {
      "cve": "CVE-2021-47277",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47277"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nkvm: avoid speculation-based attacks from out-of-range memslot accesses\n\nKVM\u0027s mechanism for accessing guest memory translates a guest physical\naddress (gpa) to a host virtual address using the right-shifted gpa\n(also known as gfn) and a struct kvm_memory_slot.  The translation is\nperformed in __gfn_to_hva_memslot using the following formula:\n\n      hva = slot-\u003euserspace_addr + (gfn - slot-\u003ebase_gfn) * PAGE_SIZE\n\nIt is expected that gfn falls within the boundaries of the guest\u0027s\nphysical memory.  However, a guest can access invalid physical addresses\nin such a way that the gfn is invalid.\n\n__gfn_to_hva_memslot is called from kvm_vcpu_gfn_to_hva_prot, which first\nretrieves a memslot through __gfn_to_memslot.  While __gfn_to_memslot\ndoes check that the gfn falls within the boundaries of the guest\u0027s\nphysical memory or not, a CPU can speculate the result of the check and\ncontinue execution speculatively using an illegal gfn. The speculation\ncan result in calculating an out-of-bounds hva.  If the resulting host\nvirtual address is used to load another guest physical address, this\nis effectively a Spectre gadget consisting of two consecutive reads,\nthe second of which is data dependent on the first.\n\nRight now it\u0027s not clear if there are any cases in which this is\nexploitable.  One interesting case was reported by the original author\nof this patch, and involves visiting guest page tables on x86.  Right\nnow these are not vulnerable because the hva read goes through get_user(),\nwhich contains an LFENCE speculation barrier.  However, there are\npatches in progress for x86 uaccess.h to mask kernel addresses instead of\nusing LFENCE; once these land, a guest could use speculation to read\nfrom the VMM\u0027s ring 3 address space.  Other architectures such as ARM\nalready use the address masking method, and would be susceptible to\nthis same kind of data-dependent access gadgets.  Therefore, this patch\nproactively protects from these attacks by masking out-of-bounds gfns\nin __gfn_to_hva_memslot, which blocks speculation of invalid hvas.\n\nSean Christopherson noted that this patch does not cover\nkvm_read_guest_offset_cached.  This however is limited to a few bytes\npast the end of the cache, and therefore it is unlikely to be useful in\nthe context of building a chain of data dependent accesses.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47277",
          "url": "https://www.suse.com/security/cve/CVE-2021-47277"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1224960 for CVE-2021-47277",
          "url": "https://bugzilla.suse.com/1224960"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-24T18:34:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47277"
    },
    {
      "cve": "CVE-2021-47280",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47280"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm: Fix use-after-free read in drm_getunique()\n\nThere is a time-of-check-to-time-of-use error in drm_getunique() due\nto retrieving file_priv-\u003emaster prior to locking the device\u0027s master\nmutex.\n\nAn example can be seen in the crash report of the use-after-free error\nfound by Syzbot:\nhttps://syzkaller.appspot.com/bug?id=148d2f1dfac64af52ffd27b661981a540724f803\n\nIn the report, the master pointer was used after being freed. This is\nbecause another process had acquired the device\u0027s master mutex in\ndrm_setmaster_ioctl(), then overwrote fpriv-\u003emaster in\ndrm_new_set_master(). The old value of fpriv-\u003emaster was subsequently\nfreed before the mutex was unlocked.\n\nTo fix this, we lock the device\u0027s master mutex before retrieving the\npointer from from fpriv-\u003emaster. This patch passes the Syzbot\nreproducer test.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47280",
          "url": "https://www.suse.com/security/cve/CVE-2021-47280"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1224982 for CVE-2021-47280",
          "url": "https://bugzilla.suse.com/1224982"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-24T18:34:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47280"
    },
    {
      "cve": "CVE-2021-47281",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47281"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: seq: Fix race of snd_seq_timer_open()\n\nThe timer instance per queue is exclusive, and snd_seq_timer_open()\nshould have managed the concurrent accesses.  It looks as if it\u0027s\nchecking the already existing timer instance at the beginning, but\nit\u0027s not right, because there is no protection, hence any later\nconcurrent call of snd_seq_timer_open() may override the timer\ninstance easily.  This may result in UAF, as the leftover timer\ninstance can keep running while the queue itself gets closed, as\nspotted by syzkaller recently.\n\nFor avoiding the race, add a proper check at the assignment of\ntmr-\u003etimeri again, and return -EBUSY if it\u0027s been already registered.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47281",
          "url": "https://www.suse.com/security/cve/CVE-2021-47281"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1224983 for CVE-2021-47281",
          "url": "https://bugzilla.suse.com/1224983"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-24T18:34:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47281"
    },
    {
      "cve": "CVE-2021-47284",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47284"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nisdn: mISDN: netjet: Fix crash in nj_probe:\n\n\u0027nj_setup\u0027 in netjet.c might fail with -EIO and in this case\n\u0027card-\u003eirq\u0027 is initialized and is bigger than zero. A subsequent call to\n\u0027nj_release\u0027 will free the irq that has not been requested.\n\nFix this bug by deleting the previous assignment to \u0027card-\u003eirq\u0027 and just\nkeep the assignment before \u0027request_irq\u0027.\n\nThe KASAN\u0027s log reveals it:\n\n[    3.354615 ] WARNING: CPU: 0 PID: 1 at kernel/irq/manage.c:1826\nfree_irq+0x100/0x480\n[    3.355112 ] Modules linked in:\n[    3.355310 ] CPU: 0 PID: 1 Comm: swapper/0 Not tainted\n5.13.0-rc1-00144-g25a1298726e #13\n[    3.355816 ] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS\nrel-1.12.0-59-gc9ba5276e321-prebuilt.qemu.org 04/01/2014\n[    3.356552 ] RIP: 0010:free_irq+0x100/0x480\n[    3.356820 ] Code: 6e 08 74 6f 4d 89 f4 e8 5e ac 09 00 4d 8b 74 24 18\n4d 85 f6 75 e3 e8 4f ac 09 00 8b 75 c8 48 c7 c7 78 c1 2e 85 e8 e0 cf f5\nff \u003c0f\u003e 0b 48 8b 75 c0 4c 89 ff e8 72 33 0b 03 48 8b 43 40 4c 8b a0 80\n[    3.358012 ] RSP: 0000:ffffc90000017b48 EFLAGS: 00010082\n[    3.358357 ] RAX: 0000000000000000 RBX: ffff888104dc8000 RCX:\n0000000000000000\n[    3.358814 ] RDX: ffff8881003c8000 RSI: ffffffff8124a9e6 RDI:\n00000000ffffffff\n[    3.359272 ] RBP: ffffc90000017b88 R08: 0000000000000000 R09:\n0000000000000000\n[    3.359732 ] R10: ffffc900000179f0 R11: 0000000000001d04 R12:\n0000000000000000\n[    3.360195 ] R13: ffff888107dc6000 R14: ffff888107dc6928 R15:\nffff888104dc80a8\n[    3.360652 ] FS:  0000000000000000(0000) GS:ffff88817bc00000(0000)\nknlGS:0000000000000000\n[    3.361170 ] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[    3.361538 ] CR2: 0000000000000000 CR3: 000000000582e000 CR4:\n00000000000006f0\n[    3.362003 ] DR0: 0000000000000000 DR1: 0000000000000000 DR2:\n0000000000000000\n[    3.362175 ] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7:\n0000000000000400\n[    3.362175 ] Call Trace:\n[    3.362175 ]  nj_release+0x51/0x1e0\n[    3.362175 ]  nj_probe+0x450/0x950\n[    3.362175 ]  ? pci_device_remove+0x110/0x110\n[    3.362175 ]  local_pci_probe+0x45/0xa0\n[    3.362175 ]  pci_device_probe+0x12b/0x1d0\n[    3.362175 ]  really_probe+0x2a9/0x610\n[    3.362175 ]  driver_probe_device+0x90/0x1d0\n[    3.362175 ]  ? mutex_lock_nested+0x1b/0x20\n[    3.362175 ]  device_driver_attach+0x68/0x70\n[    3.362175 ]  __driver_attach+0x124/0x1b0\n[    3.362175 ]  ? device_driver_attach+0x70/0x70\n[    3.362175 ]  bus_for_each_dev+0xbb/0x110\n[    3.362175 ]  ? rdinit_setup+0x45/0x45\n[    3.362175 ]  driver_attach+0x27/0x30\n[    3.362175 ]  bus_add_driver+0x1eb/0x2a0\n[    3.362175 ]  driver_register+0xa9/0x180\n[    3.362175 ]  __pci_register_driver+0x82/0x90\n[    3.362175 ]  ? w6692_init+0x38/0x38\n[    3.362175 ]  nj_init+0x36/0x38\n[    3.362175 ]  do_one_initcall+0x7f/0x3d0\n[    3.362175 ]  ? rdinit_setup+0x45/0x45\n[    3.362175 ]  ? rcu_read_lock_sched_held+0x4f/0x80\n[    3.362175 ]  kernel_init_freeable+0x2aa/0x301\n[    3.362175 ]  ? rest_init+0x2c0/0x2c0\n[    3.362175 ]  kernel_init+0x18/0x190\n[    3.362175 ]  ? rest_init+0x2c0/0x2c0\n[    3.362175 ]  ? rest_init+0x2c0/0x2c0\n[    3.362175 ]  ret_from_fork+0x1f/0x30\n[    3.362175 ] Kernel panic - not syncing: panic_on_warn set ...\n[    3.362175 ] CPU: 0 PID: 1 Comm: swapper/0 Not tainted\n5.13.0-rc1-00144-g25a1298726e #13\n[    3.362175 ] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS\nrel-1.12.0-59-gc9ba5276e321-prebuilt.qemu.org 04/01/2014\n[    3.362175 ] Call Trace:\n[    3.362175 ]  dump_stack+0xba/0xf5\n[    3.362175 ]  ? free_irq+0x100/0x480\n[    3.362175 ]  panic+0x15a/0x3f2\n[    3.362175 ]  ? __warn+0xf2/0x150\n[    3.362175 ]  ? free_irq+0x100/0x480\n[    3.362175 ]  __warn+0x108/0x150\n[    3.362175 ]  ? free_irq+0x100/0x480\n[    3.362175 ]  report_bug+0x119/0x1c0\n[    3.362175 ]  handle_bug+0x3b/0x80\n[    3.362175 ]  exc_invalid_op+0x18/0x70\n[    3.362175 ]  asm_exc_invalid_op+0x12/0x20\n[    3.362175 ] RIP: 0010:free_irq+0x100\n---truncated---",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47284",
          "url": "https://www.suse.com/security/cve/CVE-2021-47284"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1224987 for CVE-2021-47284",
          "url": "https://bugzilla.suse.com/1224987"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-24T18:34:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47284"
    },
    {
      "cve": "CVE-2021-47285",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47285"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47285",
          "url": "https://www.suse.com/security/cve/CVE-2021-47285"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1224981 for CVE-2021-47285",
          "url": "https://bugzilla.suse.com/1224981"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 0,
            "baseSeverity": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-24T18:34:20Z",
          "details": "low"
        }
      ],
      "title": "CVE-2021-47285"
    },
    {
      "cve": "CVE-2021-47288",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47288"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: ngene: Fix out-of-bounds bug in ngene_command_config_free_buf()\n\nFix an 11-year old bug in ngene_command_config_free_buf() while\naddressing the following warnings caught with -Warray-bounds:\n\narch/alpha/include/asm/string.h:22:16: warning: \u0027__builtin_memcpy\u0027 offset [12, 16] from the object at \u0027com\u0027 is out of the bounds of referenced subobject \u0027config\u0027 with type \u0027unsigned char\u0027 at offset 10 [-Warray-bounds]\narch/x86/include/asm/string_32.h:182:25: warning: \u0027__builtin_memcpy\u0027 offset [12, 16] from the object at \u0027com\u0027 is out of the bounds of referenced subobject \u0027config\u0027 with type \u0027unsigned char\u0027 at offset 10 [-Warray-bounds]\n\nThe problem is that the original code is trying to copy 6 bytes of\ndata into a one-byte size member _config_ of the wrong structue\nFW_CONFIGURE_BUFFERS, in a single call to memcpy(). This causes a\nlegitimate compiler warning because memcpy() overruns the length\nof \u0026com.cmd.ConfigureBuffers.config. It seems that the right\nstructure is FW_CONFIGURE_FREE_BUFFERS, instead, because it contains\n6 more members apart from the header _hdr_. Also, the name of\nthe function ngene_command_config_free_buf() suggests that the actual\nintention is to ConfigureFreeBuffers, instead of ConfigureBuffers\n(which takes place in the function ngene_command_config_buf(), above).\n\nFix this by enclosing those 6 members of struct FW_CONFIGURE_FREE_BUFFERS\ninto new struct config, and use \u0026com.cmd.ConfigureFreeBuffers.config as\nthe destination address, instead of \u0026com.cmd.ConfigureBuffers.config,\nwhen calling memcpy().\n\nThis also helps with the ongoing efforts to globally enable\n-Warray-bounds and get us closer to being able to tighten the\nFORTIFY_SOURCE routines on memcpy().",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47288",
          "url": "https://www.suse.com/security/cve/CVE-2021-47288"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1224889 for CVE-2021-47288",
          "url": "https://bugzilla.suse.com/1224889"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-24T18:34:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47288"
    },
    {
      "cve": "CVE-2021-47301",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47301"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nigb: Fix use-after-free error during reset\n\nCleans the next descriptor to watch (next_to_watch) when cleaning the\nTX ring.\n\nFailure to do so can cause invalid memory accesses. If igb_poll() runs\nwhile the controller is reset this can lead to the driver try to free\na skb that was already freed.\n\n(The crash is harder to reproduce with the igb driver, but the same\npotential problem exists as the code is identical to igc)",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47301",
          "url": "https://www.suse.com/security/cve/CVE-2021-47301"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1224916 for CVE-2021-47301",
          "url": "https://bugzilla.suse.com/1224916"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-24T18:34:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47301"
    },
    {
      "cve": "CVE-2021-47302",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47302"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nigc: Fix use-after-free error during reset\n\nCleans the next descriptor to watch (next_to_watch) when cleaning the\nTX ring.\n\nFailure to do so can cause invalid memory accesses. If igc_poll() runs\nwhile the controller is being reset this can lead to the driver try to\nfree a skb that was already freed.\n\nLog message:\n\n [  101.525242] refcount_t: underflow; use-after-free.\n [  101.525251] WARNING: CPU: 1 PID: 646 at lib/refcount.c:28 refcount_warn_saturate+0xab/0xf0\n [  101.525259] Modules linked in: sch_etf(E) sch_mqprio(E) rfkill(E) intel_rapl_msr(E) intel_rapl_common(E)\n x86_pkg_temp_thermal(E) intel_powerclamp(E) coretemp(E) binfmt_misc(E) kvm_intel(E) kvm(E) irqbypass(E) crc32_pclmul(E)\n ghash_clmulni_intel(E) aesni_intel(E) mei_wdt(E) libaes(E) crypto_simd(E) cryptd(E) glue_helper(E) snd_hda_codec_hdmi(E)\n rapl(E) intel_cstate(E) snd_hda_intel(E) snd_intel_dspcfg(E) sg(E) soundwire_intel(E) intel_uncore(E) at24(E)\n soundwire_generic_allocation(E) iTCO_wdt(E) soundwire_cadence(E) intel_pmc_bxt(E) serio_raw(E) snd_hda_codec(E)\n iTCO_vendor_support(E) watchdog(E) snd_hda_core(E) snd_hwdep(E) snd_soc_core(E) snd_compress(E) snd_pcsp(E)\n soundwire_bus(E) snd_pcm(E) evdev(E) snd_timer(E) mei_me(E) snd(E) soundcore(E) mei(E) configfs(E) ip_tables(E) x_tables(E)\n autofs4(E) ext4(E) crc32c_generic(E) crc16(E) mbcache(E) jbd2(E) sd_mod(E) t10_pi(E) crc_t10dif(E) crct10dif_generic(E)\n i915(E) ahci(E) libahci(E) ehci_pci(E) igb(E) xhci_pci(E) ehci_hcd(E)\n [  101.525303]  drm_kms_helper(E) dca(E) xhci_hcd(E) libata(E) crct10dif_pclmul(E) cec(E) crct10dif_common(E) tsn(E) igc(E)\n e1000e(E) ptp(E) i2c_i801(E) crc32c_intel(E) psmouse(E) i2c_algo_bit(E) i2c_smbus(E) scsi_mod(E) lpc_ich(E) pps_core(E)\n usbcore(E) drm(E) button(E) video(E)\n [  101.525318] CPU: 1 PID: 646 Comm: irq/37-enp7s0-T Tainted: G            E     5.10.30-rt37-tsn1-rt-ipipe #ipipe\n [  101.525320] Hardware name: SIEMENS AG SIMATIC IPC427D/A5E31233588, BIOS V17.02.09 03/31/2017\n [  101.525322] RIP: 0010:refcount_warn_saturate+0xab/0xf0\n [  101.525325] Code: 05 31 48 44 01 01 e8 f0 c6 42 00 0f 0b c3 80 3d 1f 48 44 01 00 75 90 48 c7 c7 78 a8 f3 a6 c6 05 0f 48\n 44 01 01 e8 d1 c6 42 00 \u003c0f\u003e 0b c3 80 3d fe 47 44 01 00 0f 85 6d ff ff ff 48 c7 c7 d0 a8 f3\n [  101.525327] RSP: 0018:ffffbdedc0917cb8 EFLAGS: 00010286\n [  101.525329] RAX: 0000000000000000 RBX: ffff98fd6becbf40 RCX: 0000000000000001\n [  101.525330] RDX: 0000000000000001 RSI: ffffffffa6f2700c RDI: 00000000ffffffff\n [  101.525332] RBP: ffff98fd6becc14c R08: ffffffffa7463d00 R09: ffffbdedc0917c50\n [  101.525333] R10: ffffffffa74c3578 R11: 0000000000000034 R12: 00000000ffffff00\n [  101.525335] R13: ffff98fd6b0b1000 R14: 0000000000000039 R15: ffff98fd6be35c40\n [  101.525337] FS:  0000000000000000(0000) GS:ffff98fd6e240000(0000) knlGS:0000000000000000\n [  101.525339] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n [  101.525341] CR2: 00007f34135a3a70 CR3: 0000000150210003 CR4: 00000000001706e0\n [  101.525343] Call Trace:\n [  101.525346]  sock_wfree+0x9c/0xa0\n [  101.525353]  unix_destruct_scm+0x7b/0xa0\n [  101.525358]  skb_release_head_state+0x40/0x90\n [  101.525362]  skb_release_all+0xe/0x30\n [  101.525364]  napi_consume_skb+0x57/0x160\n [  101.525367]  igc_poll+0xb7/0xc80 [igc]\n [  101.525376]  ? sched_clock+0x5/0x10\n [  101.525381]  ? sched_clock_cpu+0xe/0x100\n [  101.525385]  net_rx_action+0x14c/0x410\n [  101.525388]  __do_softirq+0xe9/0x2f4\n [  101.525391]  __local_bh_enable_ip+0xe3/0x110\n [  101.525395]  ? irq_finalize_oneshot.part.47+0xe0/0xe0\n [  101.525398]  irq_forced_thread_fn+0x6a/0x80\n [  101.525401]  irq_thread+0xe8/0x180\n [  101.525403]  ? wake_threads_waitq+0x30/0x30\n [  101.525406]  ? irq_thread_check_affinity+0xd0/0xd0\n [  101.525408]  kthread+0x183/0x1a0\n [  101.525412]  ? kthread_park+0x80/0x80\n [  101.525415]  ret_from_fork+0x22/0x30",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47302",
          "url": "https://www.suse.com/security/cve/CVE-2021-47302"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1224917 for CVE-2021-47302",
          "url": "https://bugzilla.suse.com/1224917"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-24T18:34:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47302"
    },
    {
      "cve": "CVE-2021-47305",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47305"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndma-buf/sync_file: Don\u0027t leak fences on merge failure\n\nEach add_fence() call does a dma_fence_get() on the relevant fence.  In\nthe error path, we weren\u0027t calling dma_fence_put() so all those fences\ngot leaked.  Also, in the krealloc_array failure case, we weren\u0027t\nfreeing the fences array.  Instead, ensure that i and fences are always\nzero-initialized and dma_fence_put() all the fences and kfree(fences) on\nevery error path.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47305",
          "url": "https://www.suse.com/security/cve/CVE-2021-47305"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1224968 for CVE-2021-47305",
          "url": "https://bugzilla.suse.com/1224968"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-24T18:34:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47305"
    },
    {
      "cve": "CVE-2021-47307",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47307"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncifs: prevent NULL deref in cifs_compose_mount_options()\n\nThe optional @ref parameter might contain an NULL node_name, so\nprevent dereferencing it in cifs_compose_mount_options().\n\nAddresses-Coverity: 1476408 (\"Explicit null dereferenced\")",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47307",
          "url": "https://www.suse.com/security/cve/CVE-2021-47307"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1224961 for CVE-2021-47307",
          "url": "https://bugzilla.suse.com/1224961"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-24T18:34:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47307"
    },
    {
      "cve": "CVE-2021-47308",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47308"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: libfc: Fix array index out of bound exception\n\nFix array index out of bound exception in fc_rport_prli_resp().",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47308",
          "url": "https://www.suse.com/security/cve/CVE-2021-47308"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1224963 for CVE-2021-47308",
          "url": "https://bugzilla.suse.com/1224963"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-24T18:34:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47308"
    },
    {
      "cve": "CVE-2021-47310",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47310"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: ti: fix UAF in tlan_remove_one\n\npriv is netdev private data and it cannot be\nused after free_netdev() call. Using priv after free_netdev()\ncan cause UAF bug. Fix it by moving free_netdev() at the end of the\nfunction.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47310",
          "url": "https://www.suse.com/security/cve/CVE-2021-47310"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1224959 for CVE-2021-47310",
          "url": "https://bugzilla.suse.com/1224959"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-24T18:34:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47310"
    },
    {
      "cve": "CVE-2021-47311",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47311"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: qcom/emac: fix UAF in emac_remove\n\nadpt is netdev private data and it cannot be\nused after free_netdev() call. Using adpt after free_netdev()\ncan cause UAF bug. Fix it by moving free_netdev() at the end of the\nfunction.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47311",
          "url": "https://www.suse.com/security/cve/CVE-2021-47311"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1225010 for CVE-2021-47311",
          "url": "https://bugzilla.suse.com/1225010"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1227752 for CVE-2021-47311",
          "url": "https://bugzilla.suse.com/1227752"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-24T18:34:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47311"
    },
    {
      "cve": "CVE-2021-47314",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47314"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmemory: fsl_ifc: fix leak of private memory on probe failure\n\nOn probe error the driver should free the memory allocated for private\nstructure.  Fix this by using resource-managed allocation.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47314",
          "url": "https://www.suse.com/security/cve/CVE-2021-47314"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1224893 for CVE-2021-47314",
          "url": "https://bugzilla.suse.com/1224893"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-24T18:34:20Z",
          "details": "low"
        }
      ],
      "title": "CVE-2021-47314"
    },
    {
      "cve": "CVE-2021-47315",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47315"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmemory: fsl_ifc: fix leak of IO mapping on probe failure\n\nOn probe error the driver should unmap the IO memory.  Smatch reports:\n\n  drivers/memory/fsl_ifc.c:298 fsl_ifc_ctrl_probe() warn: \u0027fsl_ifc_ctrl_dev-\u003egregs\u0027 not released on lines: 298.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47315",
          "url": "https://www.suse.com/security/cve/CVE-2021-47315"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1224892 for CVE-2021-47315",
          "url": "https://bugzilla.suse.com/1224892"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-24T18:34:20Z",
          "details": "low"
        }
      ],
      "title": "CVE-2021-47315"
    },
    {
      "cve": "CVE-2021-47319",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47319"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvirtio-blk: Fix memory leak among suspend/resume procedure\n\nThe vblk-\u003evqs should be freed before we call init_vqs()\nin virtblk_restore().",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47319",
          "url": "https://www.suse.com/security/cve/CVE-2021-47319"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1225054 for CVE-2021-47319",
          "url": "https://bugzilla.suse.com/1225054"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-24T18:34:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47319"
    },
    {
      "cve": "CVE-2021-47320",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47320"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnfs: fix acl memory leak of posix_acl_create()\n\nWhen looking into another nfs xfstests report, I found acl and\ndefault_acl in nfs3_proc_create() and nfs3_proc_mknod() error\npaths are possibly leaked. Fix them in advance.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47320",
          "url": "https://www.suse.com/security/cve/CVE-2021-47320"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1225058 for CVE-2021-47320",
          "url": "https://bugzilla.suse.com/1225058"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-24T18:34:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47320"
    },
    {
      "cve": "CVE-2021-47321",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47321"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwatchdog: Fix possible use-after-free by calling del_timer_sync()\n\nThis driver\u0027s remove path calls del_timer(). However, that function\ndoes not wait until the timer handler finishes. This means that the\ntimer handler may still be running after the driver\u0027s remove function\nhas finished, which would result in a use-after-free.\n\nFix by calling del_timer_sync(), which makes sure the timer handler\nhas finished, and unable to re-schedule itself.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47321",
          "url": "https://www.suse.com/security/cve/CVE-2021-47321"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1225060 for CVE-2021-47321",
          "url": "https://bugzilla.suse.com/1225060"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-24T18:34:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47321"
    },
    {
      "cve": "CVE-2021-47323",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47323"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwatchdog: sc520_wdt: Fix possible use-after-free in wdt_turnoff()\n\nThis module\u0027s remove path calls del_timer(). However, that function\ndoes not wait until the timer handler finishes. This means that the\ntimer handler may still be running after the driver\u0027s remove function\nhas finished, which would result in a use-after-free.\n\nFix by calling del_timer_sync(), which makes sure the timer handler\nhas finished, and unable to re-schedule itself.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47323",
          "url": "https://www.suse.com/security/cve/CVE-2021-47323"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1225026 for CVE-2021-47323",
          "url": "https://bugzilla.suse.com/1225026"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1227557 for CVE-2021-47323",
          "url": "https://bugzilla.suse.com/1227557"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-24T18:34:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47323"
    },
    {
      "cve": "CVE-2021-47324",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47324"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwatchdog: Fix possible use-after-free in wdt_startup()\n\nThis module\u0027s remove path calls del_timer(). However, that function\ndoes not wait until the timer handler finishes. This means that the\ntimer handler may still be running after the driver\u0027s remove function\nhas finished, which would result in a use-after-free.\n\nFix by calling del_timer_sync(), which makes sure the timer handler\nhas finished, and unable to re-schedule itself.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47324",
          "url": "https://www.suse.com/security/cve/CVE-2021-47324"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1225030 for CVE-2021-47324",
          "url": "https://bugzilla.suse.com/1225030"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1225038 for CVE-2021-47324",
          "url": "https://bugzilla.suse.com/1225038"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-24T18:34:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47324"
    },
    {
      "cve": "CVE-2021-47330",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47330"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntty: serial: 8250: serial_cs: Fix a memory leak in error handling path\n\nIn the probe function, if the final \u0027serial_config()\u0027 fails, \u0027info\u0027 is\nleaking.\n\nAdd a resource handling path to free this memory.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47330",
          "url": "https://www.suse.com/security/cve/CVE-2021-47330"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1225084 for CVE-2021-47330",
          "url": "https://bugzilla.suse.com/1225084"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-24T18:34:20Z",
          "details": "low"
        }
      ],
      "title": "CVE-2021-47330"
    },
    {
      "cve": "CVE-2021-47334",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47334"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmisc/libmasm/module: Fix two use after free in ibmasm_init_one\n\nIn ibmasm_init_one, it calls ibmasm_init_remote_input_dev().\nInside ibmasm_init_remote_input_dev, mouse_dev and keybd_dev are\nallocated by input_allocate_device(), and assigned to\nsp-\u003eremote.mouse_dev and sp-\u003eremote.keybd_dev respectively.\n\nIn the err_free_devices error branch of ibmasm_init_one,\nmouse_dev and keybd_dev are freed by input_free_device(), and return\nerror. Then the execution runs into error_send_message error branch\nof ibmasm_init_one, where ibmasm_free_remote_input_dev(sp) is called\nto unregister the freed sp-\u003eremote.mouse_dev and sp-\u003eremote.keybd_dev.\n\nMy patch add a \"error_init_remote\" label to handle the error of\nibmasm_init_remote_input_dev(), to avoid the uaf bugs.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47334",
          "url": "https://www.suse.com/security/cve/CVE-2021-47334"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1225112 for CVE-2021-47334",
          "url": "https://bugzilla.suse.com/1225112"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.6,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-24T18:34:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47334"
    },
    {
      "cve": "CVE-2021-47337",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47337"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: core: Fix bad pointer dereference when ehandler kthread is invalid\n\nCommit 66a834d09293 (\"scsi: core: Fix error handling of scsi_host_alloc()\")\nchanged the allocation logic to call put_device() to perform host cleanup\nwith the assumption that IDA removal and stopping the kthread would\nproperly be performed in scsi_host_dev_release(). However, in the unlikely\ncase that the error handler thread fails to spawn, shost-\u003eehandler is set\nto ERR_PTR(-ENOMEM).\n\nThe error handler cleanup code in scsi_host_dev_release() will call\nkthread_stop() if shost-\u003eehandler != NULL which will always be the case\nwhether the kthread was successfully spawned or not. In the case that it\nfailed to spawn this has the nasty side effect of trying to dereference an\ninvalid pointer when kthread_stop() is called. The following splat provides\nan example of this behavior in the wild:\n\nscsi host11: error handler thread failed to spawn, error = -4\nKernel attempted to read user page (10c) - exploit attempt? (uid: 0)\nBUG: Kernel NULL pointer dereference on read at 0x0000010c\nFaulting instruction address: 0xc00000000818e9a8\nOops: Kernel access of bad area, sig: 11 [#1]\nLE PAGE_SIZE=64K MMU=Hash SMP NR_CPUS=2048 NUMA pSeries\nModules linked in: ibmvscsi(+) scsi_transport_srp dm_multipath dm_mirror dm_region\n hash dm_log dm_mod fuse overlay squashfs loop\nCPU: 12 PID: 274 Comm: systemd-udevd Not tainted 5.13.0-rc7 #1\nNIP:  c00000000818e9a8 LR: c0000000089846e8 CTR: 0000000000007ee8\nREGS: c000000037d12ea0 TRAP: 0300   Not tainted  (5.13.0-rc7)\nMSR:  800000000280b033 \u0026lt;SF,VEC,VSX,EE,FP,ME,IR,DR,RI,LE\u0026gt;  CR: 28228228\nXER: 20040001\nCFAR: c0000000089846e4 DAR: 000000000000010c DSISR: 40000000 IRQMASK: 0\nGPR00: c0000000089846e8 c000000037d13140 c000000009cc1100 fffffffffffffffc\nGPR04: 0000000000000001 0000000000000000 0000000000000000 c000000037dc0000\nGPR08: 0000000000000000 c000000037dc0000 0000000000000001 00000000fffff7ff\nGPR12: 0000000000008000 c00000000a049000 c000000037d13d00 000000011134d5a0\nGPR16: 0000000000001740 c0080000190d0000 c0080000190d1740 c000000009129288\nGPR20: c000000037d13bc0 0000000000000001 c000000037d13bc0 c0080000190b7898\nGPR24: c0080000190b7708 0000000000000000 c000000033bb2c48 0000000000000000\nGPR28: c000000046b28280 0000000000000000 000000000000010c fffffffffffffffc\nNIP [c00000000818e9a8] kthread_stop+0x38/0x230\nLR [c0000000089846e8] scsi_host_dev_release+0x98/0x160\nCall Trace:\n[c000000033bb2c48] 0xc000000033bb2c48 (unreliable)\n[c0000000089846e8] scsi_host_dev_release+0x98/0x160\n[c00000000891e960] device_release+0x60/0x100\n[c0000000087e55c4] kobject_release+0x84/0x210\n[c00000000891ec78] put_device+0x28/0x40\n[c000000008984ea4] scsi_host_alloc+0x314/0x430\n[c0080000190b38bc] ibmvscsi_probe+0x54/0xad0 [ibmvscsi]\n[c000000008110104] vio_bus_probe+0xa4/0x4b0\n[c00000000892a860] really_probe+0x140/0x680\n[c00000000892aefc] driver_probe_device+0x15c/0x200\n[c00000000892b63c] device_driver_attach+0xcc/0xe0\n[c00000000892b740] __driver_attach+0xf0/0x200\n[c000000008926f28] bus_for_each_dev+0xa8/0x130\n[c000000008929ce4] driver_attach+0x34/0x50\n[c000000008928fc0] bus_add_driver+0x1b0/0x300\n[c00000000892c798] driver_register+0x98/0x1a0\n[c00000000810eb60] __vio_register_driver+0x80/0xe0\n[c0080000190b4a30] ibmvscsi_module_init+0x9c/0xdc [ibmvscsi]\n[c0000000080121d0] do_one_initcall+0x60/0x2d0\n[c000000008261abc] do_init_module+0x7c/0x320\n[c000000008265700] load_module+0x2350/0x25b0\n[c000000008265cb4] __do_sys_finit_module+0xd4/0x160\n[c000000008031110] system_call_exception+0x150/0x2d0\n[c00000000800d35c] system_call_common+0xec/0x278\n\nFix this be nulling shost-\u003eehandler when the kthread fails to spawn.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47337",
          "url": "https://www.suse.com/security/cve/CVE-2021-47337"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1224926 for CVE-2021-47337",
          "url": "https://bugzilla.suse.com/1224926"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-24T18:34:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47337"
    },
    {
      "cve": "CVE-2021-47343",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47343"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndm btree remove: assign new_root only when removal succeeds\n\nremove_raw() in dm_btree_remove() may fail due to IO read error\n(e.g. read the content of origin block fails during shadowing),\nand the value of shadow_spine::root is uninitialized, but\nthe uninitialized value is still assign to new_root in the\nend of dm_btree_remove().\n\nFor dm-thin, the value of pmd-\u003edetails_root or pmd-\u003eroot will become\nan uninitialized value, so if trying to read details_info tree again\nout-of-bound memory may occur as showed below:\n\n  general protection fault, probably for non-canonical address 0x3fdcb14c8d7520\n  CPU: 4 PID: 515 Comm: dmsetup Not tainted 5.13.0-rc6\n  Hardware name: QEMU Standard PC\n  RIP: 0010:metadata_ll_load_ie+0x14/0x30\n  Call Trace:\n   sm_metadata_count_is_more_than_one+0xb9/0xe0\n   dm_tm_shadow_block+0x52/0x1c0\n   shadow_step+0x59/0xf0\n   remove_raw+0xb2/0x170\n   dm_btree_remove+0xf4/0x1c0\n   dm_pool_delete_thin_device+0xc3/0x140\n   pool_message+0x218/0x2b0\n   target_message+0x251/0x290\n   ctl_ioctl+0x1c4/0x4d0\n   dm_ctl_ioctl+0xe/0x20\n   __x64_sys_ioctl+0x7b/0xb0\n   do_syscall_64+0x40/0xb0\n   entry_SYSCALL_64_after_hwframe+0x44/0xae\n\nFixing it by only assign new_root when removal succeeds",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47343",
          "url": "https://www.suse.com/security/cve/CVE-2021-47343"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1225155 for CVE-2021-47343",
          "url": "https://bugzilla.suse.com/1225155"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-24T18:34:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47343"
    },
    {
      "cve": "CVE-2021-47344",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47344"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: zr364xx: fix memory leak in zr364xx_start_readpipe\n\nsyzbot reported memory leak in zr364xx driver.\nThe problem was in non-freed urb in case of\nusb_submit_urb() fail.\n\nbacktrace:\n  [\u003cffffffff82baedf6\u003e] kmalloc include/linux/slab.h:561 [inline]\n  [\u003cffffffff82baedf6\u003e] usb_alloc_urb+0x66/0xe0 drivers/usb/core/urb.c:74\n  [\u003cffffffff82f7cce8\u003e] zr364xx_start_readpipe+0x78/0x130 drivers/media/usb/zr364xx/zr364xx.c:1022\n  [\u003cffffffff84251dfc\u003e] zr364xx_board_init drivers/media/usb/zr364xx/zr364xx.c:1383 [inline]\n  [\u003cffffffff84251dfc\u003e] zr364xx_probe+0x6a3/0x851 drivers/media/usb/zr364xx/zr364xx.c:1516\n  [\u003cffffffff82bb6507\u003e] usb_probe_interface+0x177/0x370 drivers/usb/core/driver.c:396\n  [\u003cffffffff826018a9\u003e] really_probe+0x159/0x500 drivers/base/dd.c:576",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47344",
          "url": "https://www.suse.com/security/cve/CVE-2021-47344"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1224922 for CVE-2021-47344",
          "url": "https://bugzilla.suse.com/1224922"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-24T18:34:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47344"
    },
    {
      "cve": "CVE-2021-47345",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47345"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/cma: Fix rdma_resolve_route() memory leak\n\nFix a memory leak when \"mda_resolve_route() is called more than once on\nthe same \"rdma_cm_id\".\n\nThis is possible if cma_query_handler() triggers the\nRDMA_CM_EVENT_ROUTE_ERROR flow which puts the state machine back and\nallows rdma_resolve_route() to be called again.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47345",
          "url": "https://www.suse.com/security/cve/CVE-2021-47345"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1225157 for CVE-2021-47345",
          "url": "https://bugzilla.suse.com/1225157"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-24T18:34:20Z",
          "details": "low"
        }
      ],
      "title": "CVE-2021-47345"
    },
    {
      "cve": "CVE-2021-47347",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47347"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwl1251: Fix possible buffer overflow in wl1251_cmd_scan\n\nFunction wl1251_cmd_scan calls memcpy without checking the length.\nHarden by checking the length is within the maximum allowed size.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47347",
          "url": "https://www.suse.com/security/cve/CVE-2021-47347"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1225177 for CVE-2021-47347",
          "url": "https://bugzilla.suse.com/1225177"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1225305 for CVE-2021-47347",
          "url": "https://bugzilla.suse.com/1225305"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-24T18:34:20Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-47347"
    },
    {
      "cve": "CVE-2021-47352",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47352"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvirtio-net: Add validation for used length\n\nThis adds validation for used length (might come\nfrom an untrusted device) to avoid data corruption\nor loss.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47352",
          "url": "https://www.suse.com/security/cve/CVE-2021-47352"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1225124 for CVE-2021-47352",
          "url": "https://bugzilla.suse.com/1225124"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-24T18:34:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47352"
    },
    {
      "cve": "CVE-2021-47353",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47353"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nudf: Fix NULL pointer dereference in udf_symlink function\n\nIn function udf_symlink, epos.bh is assigned with the value returned\nby udf_tgetblk. The function udf_tgetblk is defined in udf/misc.c\nand returns the value of sb_getblk function that could be NULL.\nThen, epos.bh is used without any check, causing a possible\nNULL pointer dereference when sb_getblk fails.\n\nThis fix adds a check to validate the value of epos.bh.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47353",
          "url": "https://www.suse.com/security/cve/CVE-2021-47353"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1225128 for CVE-2021-47353",
          "url": "https://bugzilla.suse.com/1225128"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-24T18:34:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47353"
    },
    {
      "cve": "CVE-2021-47355",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47355"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\natm: nicstar: Fix possible use-after-free in nicstar_cleanup()\n\nThis module\u0027s remove path calls del_timer(). However, that function\ndoes not wait until the timer handler finishes. This means that the\ntimer handler may still be running after the driver\u0027s remove function\nhas finished, which would result in a use-after-free.\n\nFix by calling del_timer_sync(), which makes sure the timer handler\nhas finished, and unable to re-schedule itself.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47355",
          "url": "https://www.suse.com/security/cve/CVE-2021-47355"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1225141 for CVE-2021-47355",
          "url": "https://bugzilla.suse.com/1225141"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-24T18:34:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47355"
    },
    {
      "cve": "CVE-2021-47356",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47356"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmISDN: fix possible use-after-free in HFC_cleanup()\n\nThis module\u0027s remove path calls del_timer(). However, that function\ndoes not wait until the timer handler finishes. This means that the\ntimer handler may still be running after the driver\u0027s remove function\nhas finished, which would result in a use-after-free.\n\nFix by calling del_timer_sync(), which makes sure the timer handler\nhas finished, and unable to re-schedule itself.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47356",
          "url": "https://www.suse.com/security/cve/CVE-2021-47356"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1225143 for CVE-2021-47356",
          "url": "https://bugzilla.suse.com/1225143"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.8,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-24T18:34:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47356"
    },
    {
      "cve": "CVE-2021-47357",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47357"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\natm: iphase: fix possible use-after-free in ia_module_exit()\n\nThis module\u0027s remove path calls del_timer(). However, that function\ndoes not wait until the timer handler finishes. This means that the\ntimer handler may still be running after the driver\u0027s remove function\nhas finished, which would result in a use-after-free.\n\nFix by calling del_timer_sync(), which makes sure the timer handler\nhas finished, and unable to re-schedule itself.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47357",
          "url": "https://www.suse.com/security/cve/CVE-2021-47357"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1225144 for CVE-2021-47357",
          "url": "https://bugzilla.suse.com/1225144"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-24T18:34:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47357"
    },
    {
      "cve": "CVE-2021-47361",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47361"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmcb: fix error handling in mcb_alloc_bus()\n\nThere are two bugs:\n1) If ida_simple_get() fails then this code calls put_device(carrier)\n   but we haven\u0027t yet called get_device(carrier) and probably that\n   leads to a use after free.\n2) After device_initialize() then we need to use put_device() to\n   release the bus.  This will free the internal resources tied to the\n   device and call mcb_free_bus() which will free the rest.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47361",
          "url": "https://www.suse.com/security/cve/CVE-2021-47361"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1225151 for CVE-2021-47361",
          "url": "https://bugzilla.suse.com/1225151"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.8,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-24T18:34:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47361"
    },
    {
      "cve": "CVE-2021-47362",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47362"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/pm: Update intermediate power state for SI\n\nUpdate the current state as boot state during dpm initialization.\nDuring the subsequent initialization, set_power_state gets called to\ntransition to the final power state. set_power_state refers to values\nfrom the current state and without current state populated, it could\nresult in NULL pointer dereference.\n\nFor ex: on platforms where PCI speed change is supported through ACPI\nATCS method, the link speed of current state needs to be queried before\ndeciding on changing to final power state\u0027s link speed. The logic to query\nATCS-support was broken on certain platforms. The issue became visible\nwhen broken ATCS-support logic got fixed with commit\nf9b7f3703ff9 (\"drm/amdgpu/acpi: make ATPX/ATCS structures global (v2)\").\n\nBug: https://gitlab.freedesktop.org/drm/amd/-/issues/1698",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47362",
          "url": "https://www.suse.com/security/cve/CVE-2021-47362"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1225153 for CVE-2021-47362",
          "url": "https://bugzilla.suse.com/1225153"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-24T18:34:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47362"
    },
    {
      "cve": "CVE-2021-47369",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47369"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ns390/qeth: fix NULL deref in qeth_clear_working_pool_list()\n\nWhen qeth_set_online() calls qeth_clear_working_pool_list() to roll\nback after an error exit from qeth_hardsetup_card(), we are at risk of\naccessing card-\u003eqdio.in_q before it was allocated by\nqeth_alloc_qdio_queues() via qeth_mpc_initialize().\n\nqeth_clear_working_pool_list() then dereferences NULL, and by writing to\nqueue-\u003ebufs[i].pool_entry scribbles all over the CPU\u0027s lowcore.\nResulting in a crash when those lowcore areas are used next (eg. on\nthe next machine-check interrupt).\n\nSuch a scenario would typically happen when the device is first set\nonline and its queues aren\u0027t allocated yet. An early IO error or certain\nmisconfigs (eg. mismatched transport mode, bad portno) then cause us to\nerror out from qeth_hardsetup_card() with card-\u003eqdio.in_q still being\nNULL.\n\nFix it by checking the pointer for NULL before accessing it.\n\nNote that we also have (rare) paths inside qeth_mpc_initialize() where\na configuration change can cause us to free the existing queues,\nexpecting that subsequent code will allocate them again. If we then\nerror out before that re-allocation happens, the same bug occurs.\n\nRoot-caused-by: Heiko Carstens \u003chca@linux.ibm.com\u003e",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47369",
          "url": "https://www.suse.com/security/cve/CVE-2021-47369"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1225164 for CVE-2021-47369",
          "url": "https://bugzilla.suse.com/1225164"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1227324 for CVE-2021-47369",
          "url": "https://bugzilla.suse.com/1227324"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-24T18:34:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47369"
    },
    {
      "cve": "CVE-2021-47375",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47375"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nblktrace: Fix uaf in blk_trace access after removing by sysfs\n\nThere is an use-after-free problem triggered by following process:\n\n      P1(sda)\t\t\t\tP2(sdb)\n\t\t\techo 0 \u003e /sys/block/sdb/trace/enable\n\t\t\t  blk_trace_remove_queue\n\t\t\t    synchronize_rcu\n\t\t\t    blk_trace_free\n\t\t\t      relay_close\nrcu_read_lock\n__blk_add_trace\n  trace_note_tsk\n  (Iterate running_trace_list)\n\t\t\t        relay_close_buf\n\t\t\t\t  relay_destroy_buf\n\t\t\t\t    kfree(buf)\n    trace_note(sdb\u0027s bt)\n      relay_reserve\n        buf-\u003eoffset \u003c- nullptr deference (use-after-free) !!!\nrcu_read_unlock\n\n[  502.714379] BUG: kernel NULL pointer dereference, address:\n0000000000000010\n[  502.715260] #PF: supervisor read access in kernel mode\n[  502.715903] #PF: error_code(0x0000) - not-present page\n[  502.716546] PGD 103984067 P4D 103984067 PUD 17592b067 PMD 0\n[  502.717252] Oops: 0000 [#1] SMP\n[  502.720308] RIP: 0010:trace_note.isra.0+0x86/0x360\n[  502.732872] Call Trace:\n[  502.733193]  __blk_add_trace.cold+0x137/0x1a3\n[  502.733734]  blk_add_trace_rq+0x7b/0xd0\n[  502.734207]  blk_add_trace_rq_issue+0x54/0xa0\n[  502.734755]  blk_mq_start_request+0xde/0x1b0\n[  502.735287]  scsi_queue_rq+0x528/0x1140\n...\n[  502.742704]  sg_new_write.isra.0+0x16e/0x3e0\n[  502.747501]  sg_ioctl+0x466/0x1100\n\nReproduce method:\n  ioctl(/dev/sda, BLKTRACESETUP, blk_user_trace_setup[buf_size=127])\n  ioctl(/dev/sda, BLKTRACESTART)\n  ioctl(/dev/sdb, BLKTRACESETUP, blk_user_trace_setup[buf_size=127])\n  ioctl(/dev/sdb, BLKTRACESTART)\n\n  echo 0 \u003e /sys/block/sdb/trace/enable \u0026\n  // Add delay(mdelay/msleep) before kernel enters blk_trace_free()\n\n  ioctl$SG_IO(/dev/sda, SG_IO, ...)\n  // Enters trace_note_tsk() after blk_trace_free() returned\n  // Use mdelay in rcu region rather than msleep(which may schedule out)\n\nRemove blk_trace from running_list before calling blk_trace_free() by\nsysfs if blk_trace is at Blktrace_running state.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47375",
          "url": "https://www.suse.com/security/cve/CVE-2021-47375"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1225193 for CVE-2021-47375",
          "url": "https://bugzilla.suse.com/1225193"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1225194 for CVE-2021-47375",
          "url": "https://bugzilla.suse.com/1225194"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-24T18:34:20Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-47375"
    },
    {
      "cve": "CVE-2021-47378",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47378"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnvme-rdma: destroy cm id before destroy qp to avoid use after free\n\nWe should always destroy cm_id before destroy qp to avoid to get cma\nevent after qp was destroyed, which may lead to use after free.\nIn RDMA connection establishment error flow, don\u0027t destroy qp in cm\nevent handler.Just report cm_error to upper level, qp will be destroy\nin nvme_rdma_alloc_queue() after destroy cm id.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47378",
          "url": "https://www.suse.com/security/cve/CVE-2021-47378"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1225201 for CVE-2021-47378",
          "url": "https://bugzilla.suse.com/1225201"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1225202 for CVE-2021-47378",
          "url": "https://bugzilla.suse.com/1225202"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-24T18:34:20Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-47378"
    },
    {
      "cve": "CVE-2021-47382",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47382"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ns390/qeth: fix deadlock during failing recovery\n\nCommit 0b9902c1fcc5 (\"s390/qeth: fix deadlock during recovery\") removed\ntaking discipline_mutex inside qeth_do_reset(), fixing potential\ndeadlocks. An error path was missed though, that still takes\ndiscipline_mutex and thus has the original deadlock potential.\n\nIntermittent deadlocks were seen when a qeth channel path is configured\noffline, causing a race between qeth_do_reset and ccwgroup_remove.\nCall qeth_set_offline() directly in the qeth_do_reset() error case and\nthen a new variant of ccwgroup_set_offline(), without taking\ndiscipline_mutex.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47382",
          "url": "https://www.suse.com/security/cve/CVE-2021-47382"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1225207 for CVE-2021-47382",
          "url": "https://bugzilla.suse.com/1225207"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-24T18:34:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47382"
    },
    {
      "cve": "CVE-2021-47383",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47383"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntty: Fix out-of-bound vmalloc access in imageblit\n\nThis issue happens when a userspace program does an ioctl\nFBIOPUT_VSCREENINFO passing the fb_var_screeninfo struct\ncontaining only the fields xres, yres, and bits_per_pixel\nwith values.\n\nIf this struct is the same as the previous ioctl, the\nvc_resize() detects it and doesn\u0027t call the resize_screen(),\nleaving the fb_var_screeninfo incomplete. And this leads to\nthe updatescrollmode() calculates a wrong value to\nfbcon_display-\u003evrows, which makes the real_y() return a\nwrong value of y, and that value, eventually, causes\nthe imageblit to access an out-of-bound address value.\n\nTo solve this issue I made the resize_screen() be called\neven if the screen does not need any resizing, so it will\n\"fix and fill\" the fb_var_screeninfo independently.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47383",
          "url": "https://www.suse.com/security/cve/CVE-2021-47383"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1225208 for CVE-2021-47383",
          "url": "https://bugzilla.suse.com/1225208"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1225211 for CVE-2021-47383",
          "url": "https://bugzilla.suse.com/1225211"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-24T18:34:20Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-47383"
    },
    {
      "cve": "CVE-2021-47391",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47391"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/cma: Ensure rdma_addr_cancel() happens before issuing more requests\n\nThe FSM can run in a circle allowing rdma_resolve_ip() to be called twice\non the same id_priv. While this cannot happen without going through the\nwork, it violates the invariant that the same address resolution\nbackground request cannot be active twice.\n\n       CPU 1                                  CPU 2\n\nrdma_resolve_addr():\n  RDMA_CM_IDLE -\u003e RDMA_CM_ADDR_QUERY\n  rdma_resolve_ip(addr_handler)  #1\n\n\t\t\t process_one_req(): for #1\n                          addr_handler():\n                            RDMA_CM_ADDR_QUERY -\u003e RDMA_CM_ADDR_BOUND\n                            mutex_unlock(\u0026id_priv-\u003ehandler_mutex);\n                            [.. handler still running ..]\n\nrdma_resolve_addr():\n  RDMA_CM_ADDR_BOUND -\u003e RDMA_CM_ADDR_QUERY\n  rdma_resolve_ip(addr_handler)\n    !! two requests are now on the req_list\n\nrdma_destroy_id():\n destroy_id_handler_unlock():\n  _destroy_id():\n   cma_cancel_operation():\n    rdma_addr_cancel()\n\n                          // process_one_req() self removes it\n\t\t          spin_lock_bh(\u0026lock);\n                           cancel_delayed_work(\u0026req-\u003ework);\n\t                   if (!list_empty(\u0026req-\u003elist)) == true\n\n      ! rdma_addr_cancel() returns after process_on_req #1 is done\n\n   kfree(id_priv)\n\n\t\t\t process_one_req(): for #2\n                          addr_handler():\n\t                    mutex_lock(\u0026id_priv-\u003ehandler_mutex);\n                            !! Use after free on id_priv\n\nrdma_addr_cancel() expects there to be one req on the list and only\ncancels the first one. The self-removal behavior of the work only happens\nafter the handler has returned. This yields a situations where the\nreq_list can have two reqs for the same \"handle\" but rdma_addr_cancel()\nonly cancels the first one.\n\nThe second req remains active beyond rdma_destroy_id() and will\nuse-after-free id_priv once it inevitably triggers.\n\nFix this by remembering if the id_priv has called rdma_resolve_ip() and\nalways cancel before calling it again. This ensures the req_list never\ngets more than one item in it and doesn\u0027t cost anything in the normal flow\nthat never uses this strange error path.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47391",
          "url": "https://www.suse.com/security/cve/CVE-2021-47391"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1225318 for CVE-2021-47391",
          "url": "https://bugzilla.suse.com/1225318"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1225319 for CVE-2021-47391",
          "url": "https://bugzilla.suse.com/1225319"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-24T18:34:20Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-47391"
    },
    {
      "cve": "CVE-2021-47397",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47397"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsctp: break out if skb_header_pointer returns NULL in sctp_rcv_ootb\n\nWe should always check if skb_header_pointer\u0027s return is NULL before\nusing it, otherwise it may cause null-ptr-deref, as syzbot reported:\n\n  KASAN: null-ptr-deref in range [0x0000000000000000-0x0000000000000007]\n  RIP: 0010:sctp_rcv_ootb net/sctp/input.c:705 [inline]\n  RIP: 0010:sctp_rcv+0x1d84/0x3220 net/sctp/input.c:196\n  Call Trace:\n  \u003cIRQ\u003e\n   sctp6_rcv+0x38/0x60 net/sctp/ipv6.c:1109\n   ip6_protocol_deliver_rcu+0x2e9/0x1ca0 net/ipv6/ip6_input.c:422\n   ip6_input_finish+0x62/0x170 net/ipv6/ip6_input.c:463\n   NF_HOOK include/linux/netfilter.h:307 [inline]\n   NF_HOOK include/linux/netfilter.h:301 [inline]\n   ip6_input+0x9c/0xd0 net/ipv6/ip6_input.c:472\n   dst_input include/net/dst.h:460 [inline]\n   ip6_rcv_finish net/ipv6/ip6_input.c:76 [inline]\n   NF_HOOK include/linux/netfilter.h:307 [inline]\n   NF_HOOK include/linux/netfilter.h:301 [inline]\n   ipv6_rcv+0x28c/0x3c0 net/ipv6/ip6_input.c:297",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47397",
          "url": "https://www.suse.com/security/cve/CVE-2021-47397"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1225082 for CVE-2021-47397",
          "url": "https://bugzilla.suse.com/1225082"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-24T18:34:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47397"
    },
    {
      "cve": "CVE-2021-47400",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47400"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: hns3: do not allow call hns3_nic_net_open repeatedly\n\nhns3_nic_net_open() is not allowed to called repeatly, but there\nis no checking for this. When doing device reset and setup tc\nconcurrently, there is a small oppotunity to call hns3_nic_net_open\nrepeatedly, and cause kernel bug by calling napi_enable twice.\n\nThe calltrace information is like below:\n[ 3078.222780] ------------[ cut here ]------------\n[ 3078.230255] kernel BUG at net/core/dev.c:6991!\n[ 3078.236224] Internal error: Oops - BUG: 0 [#1] PREEMPT SMP\n[ 3078.243431] Modules linked in: hns3 hclgevf hclge hnae3 vfio_iommu_type1 vfio_pci vfio_virqfd vfio pv680_mii(O)\n[ 3078.258880] CPU: 0 PID: 295 Comm: kworker/u8:5 Tainted: G           O      5.14.0-rc4+ #1\n[ 3078.269102] Hardware name:  , BIOS KpxxxFPGA 1P B600 V181 08/12/2021\n[ 3078.276801] Workqueue: hclge hclge_service_task [hclge]\n[ 3078.288774] pstate: 60400009 (nZCv daif +PAN -UAO -TCO BTYPE=--)\n[ 3078.296168] pc : napi_enable+0x80/0x84\ntc qdisc sho[w  3d0e7v8 .e3t0h218 79] lr : hns3_nic_net_open+0x138/0x510 [hns3]\n\n[ 3078.314771] sp : ffff8000108abb20\n[ 3078.319099] x29: ffff8000108abb20 x28: 0000000000000000 x27: ffff0820a8490300\n[ 3078.329121] x26: 0000000000000001 x25: ffff08209cfc6200 x24: 0000000000000000\n[ 3078.339044] x23: ffff0820a8490300 x22: ffff08209cd76000 x21: ffff0820abfe3880\n[ 3078.349018] x20: 0000000000000000 x19: ffff08209cd76900 x18: 0000000000000000\n[ 3078.358620] x17: 0000000000000000 x16: ffffc816e1727a50 x15: 0000ffff8f4ff930\n[ 3078.368895] x14: 0000000000000000 x13: 0000000000000000 x12: 0000259e9dbeb6b4\n[ 3078.377987] x11: 0096a8f7e764eb40 x10: 634615ad28d3eab5 x9 : ffffc816ad8885b8\n[ 3078.387091] x8 : ffff08209cfc6fb8 x7 : ffff0820ac0da058 x6 : ffff0820a8490344\n[ 3078.396356] x5 : 0000000000000140 x4 : 0000000000000003 x3 : ffff08209cd76938\n[ 3078.405365] x2 : 0000000000000000 x1 : 0000000000000010 x0 : ffff0820abfe38a0\n[ 3078.414657] Call trace:\n[ 3078.418517]  napi_enable+0x80/0x84\n[ 3078.424626]  hns3_reset_notify_up_enet+0x78/0xd0 [hns3]\n[ 3078.433469]  hns3_reset_notify+0x64/0x80 [hns3]\n[ 3078.441430]  hclge_notify_client+0x68/0xb0 [hclge]\n[ 3078.450511]  hclge_reset_rebuild+0x524/0x884 [hclge]\n[ 3078.458879]  hclge_reset_service_task+0x3c4/0x680 [hclge]\n[ 3078.467470]  hclge_service_task+0xb0/0xb54 [hclge]\n[ 3078.475675]  process_one_work+0x1dc/0x48c\n[ 3078.481888]  worker_thread+0x15c/0x464\n[ 3078.487104]  kthread+0x160/0x170\n[ 3078.492479]  ret_from_fork+0x10/0x18\n[ 3078.498785] Code: c8027c81 35ffffa2 d50323bf d65f03c0 (d4210000)\n[ 3078.506889] ---[ end trace 8ebe0340a1b0fb44 ]---\n\nOnce hns3_nic_net_open() is excute success, the flag\nHNS3_NIC_STATE_DOWN will be cleared. So add checking for this\nflag, directly return when HNS3_NIC_STATE_DOWN is no set.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47400",
          "url": "https://www.suse.com/security/cve/CVE-2021-47400"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1225329 for CVE-2021-47400",
          "url": "https://bugzilla.suse.com/1225329"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-24T18:34:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47400"
    },
    {
      "cve": "CVE-2021-47401",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47401"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipack: ipoctal: fix stack information leak\n\nThe tty driver name is used also after registering the driver and must\nspecifically not be allocated on the stack to avoid leaking information\nto user space (or triggering an oops).\n\nDrivers should not try to encode topology information in the tty device\nname but this one snuck in through staging without anyone noticing and\nanother driver has since copied this malpractice.\n\nFixing the ABI is a separate issue, but this at least plugs the security\nhole.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47401",
          "url": "https://www.suse.com/security/cve/CVE-2021-47401"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1225242 for CVE-2021-47401",
          "url": "https://bugzilla.suse.com/1225242"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-24T18:34:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47401"
    },
    {
      "cve": "CVE-2021-47404",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47404"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nHID: betop: fix slab-out-of-bounds Write in betop_probe\n\nSyzbot reported slab-out-of-bounds Write bug in hid-betopff driver.\nThe problem is the driver assumes the device must have an input report but\nsome malicious devices violate this assumption.\n\nSo this patch checks hid_device\u0027s input is non empty before it\u0027s been used.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47404",
          "url": "https://www.suse.com/security/cve/CVE-2021-47404"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1225303 for CVE-2021-47404",
          "url": "https://bugzilla.suse.com/1225303"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-24T18:34:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47404"
    },
    {
      "cve": "CVE-2021-47409",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47409"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: dwc2: check return value after calling platform_get_resource()\n\nIt will cause null-ptr-deref if platform_get_resource() returns NULL,\nwe need check the return value.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47409",
          "url": "https://www.suse.com/security/cve/CVE-2021-47409"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1225330 for CVE-2021-47409",
          "url": "https://bugzilla.suse.com/1225330"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-24T18:34:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47409"
    },
    {
      "cve": "CVE-2021-47416",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47416"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nphy: mdio: fix memory leak\n\nSyzbot reported memory leak in MDIO bus interface, the problem was in\nwrong state logic.\n\nMDIOBUS_ALLOCATED indicates 2 states:\n\t1. Bus is only allocated\n\t2. Bus allocated and __mdiobus_register() fails, but\n\t   device_register() was called\n\nIn case of device_register() has been called we should call put_device()\nto correctly free the memory allocated for this device, but mdiobus_free()\ncalls just kfree(dev) in case of MDIOBUS_ALLOCATED state\n\nTo avoid this behaviour we need to set bus-\u003estate to MDIOBUS_UNREGISTERED\n_before_ calling device_register(), because put_device() should be\ncalled even in case of device_register() failure.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47416",
          "url": "https://www.suse.com/security/cve/CVE-2021-47416"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1225189 for CVE-2021-47416",
          "url": "https://bugzilla.suse.com/1225189"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1225336 for CVE-2021-47416",
          "url": "https://bugzilla.suse.com/1225336"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-24T18:34:20Z",
          "details": "low"
        }
      ],
      "title": "CVE-2021-47416"
    },
    {
      "cve": "CVE-2021-47423",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47423"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/nouveau/debugfs: fix file release memory leak\n\nWhen using single_open() for opening, single_release() should be\ncalled, otherwise the \u0027op\u0027 allocated in single_open() will be leaked.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47423",
          "url": "https://www.suse.com/security/cve/CVE-2021-47423"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1225366 for CVE-2021-47423",
          "url": "https://bugzilla.suse.com/1225366"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-24T18:34:20Z",
          "details": "low"
        }
      ],
      "title": "CVE-2021-47423"
    },
    {
      "cve": "CVE-2021-47424",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47424"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ni40e: Fix freeing of uninitialized misc IRQ vector\n\nWhen VSI set up failed in i40e_probe() as part of PF switch set up\ndriver was trying to free misc IRQ vectors in\ni40e_clear_interrupt_scheme and produced a kernel Oops:\n\n   Trying to free already-free IRQ 266\n   WARNING: CPU: 0 PID: 5 at kernel/irq/manage.c:1731 __free_irq+0x9a/0x300\n   Workqueue: events work_for_cpu_fn\n   RIP: 0010:__free_irq+0x9a/0x300\n   Call Trace:\n   ? synchronize_irq+0x3a/0xa0\n   free_irq+0x2e/0x60\n   i40e_clear_interrupt_scheme+0x53/0x190 [i40e]\n   i40e_probe.part.108+0x134b/0x1a40 [i40e]\n   ? kmem_cache_alloc+0x158/0x1c0\n   ? acpi_ut_update_ref_count.part.1+0x8e/0x345\n   ? acpi_ut_update_object_reference+0x15e/0x1e2\n   ? strstr+0x21/0x70\n   ? irq_get_irq_data+0xa/0x20\n   ? mp_check_pin_attr+0x13/0xc0\n   ? irq_get_irq_data+0xa/0x20\n   ? mp_map_pin_to_irq+0xd3/0x2f0\n   ? acpi_register_gsi_ioapic+0x93/0x170\n   ? pci_conf1_read+0xa4/0x100\n   ? pci_bus_read_config_word+0x49/0x70\n   ? do_pci_enable_device+0xcc/0x100\n   local_pci_probe+0x41/0x90\n   work_for_cpu_fn+0x16/0x20\n   process_one_work+0x1a7/0x360\n   worker_thread+0x1cf/0x390\n   ? create_worker+0x1a0/0x1a0\n   kthread+0x112/0x130\n   ? kthread_flush_work_fn+0x10/0x10\n   ret_from_fork+0x1f/0x40\n\nThe problem is that at that point misc IRQ vectors\nwere not allocated yet and we get a call trace\nthat driver is trying to free already free IRQ vectors.\n\nAdd a check in i40e_clear_interrupt_scheme for __I40E_MISC_IRQ_REQUESTED\nPF state before calling i40e_free_misc_vector. This state is set only if\nmisc IRQ vectors were properly initialized.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47424",
          "url": "https://www.suse.com/security/cve/CVE-2021-47424"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1225367 for CVE-2021-47424",
          "url": "https://bugzilla.suse.com/1225367"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-24T18:34:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47424"
    },
    {
      "cve": "CVE-2021-47431",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47431"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amdgpu: fix gart.bo pin_count leak\n\ngmc_v{9,10}_0_gart_disable() isn\u0027t called matched with\ncorrespoding gart_enbale function in SRIOV case. This will\nlead to gart.bo pin_count leak on driver unload.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47431",
          "url": "https://www.suse.com/security/cve/CVE-2021-47431"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1225390 for CVE-2021-47431",
          "url": "https://bugzilla.suse.com/1225390"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-24T18:34:20Z",
          "details": "low"
        }
      ],
      "title": "CVE-2021-47431"
    },
    {
      "cve": "CVE-2021-47435",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47435"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndm: fix mempool NULL pointer race when completing IO\n\ndm_io_dec_pending() calls end_io_acct() first and will then dec md\nin-flight pending count. But if a task is swapping DM table at same\ntime this can result in a crash due to mempool-\u003eelements being NULL:\n\ntask1                             task2\ndo_resume\n -\u003edo_suspend\n  -\u003edm_wait_for_completion\n                                  bio_endio\n\t\t\t\t   -\u003eclone_endio\n\t\t\t\t    -\u003edm_io_dec_pending\n\t\t\t\t     -\u003eend_io_acct\n\t\t\t\t      -\u003ewakeup task1\n -\u003edm_swap_table\n  -\u003e__bind\n   -\u003e__bind_mempools\n    -\u003ebioset_exit\n     -\u003emempool_exit\n                                     -\u003efree_io\n\n[ 67.330330] Unable to handle kernel NULL pointer dereference at\nvirtual address 0000000000000000\n......\n[ 67.330494] pstate: 80400085 (Nzcv daIf +PAN -UAO)\n[ 67.330510] pc : mempool_free+0x70/0xa0\n[ 67.330515] lr : mempool_free+0x4c/0xa0\n[ 67.330520] sp : ffffff8008013b20\n[ 67.330524] x29: ffffff8008013b20 x28: 0000000000000004\n[ 67.330530] x27: ffffffa8c2ff40a0 x26: 00000000ffff1cc8\n[ 67.330535] x25: 0000000000000000 x24: ffffffdada34c800\n[ 67.330541] x23: 0000000000000000 x22: ffffffdada34c800\n[ 67.330547] x21: 00000000ffff1cc8 x20: ffffffd9a1304d80\n[ 67.330552] x19: ffffffdada34c970 x18: 000000b312625d9c\n[ 67.330558] x17: 00000000002dcfbf x16: 00000000000006dd\n[ 67.330563] x15: 000000000093b41e x14: 0000000000000010\n[ 67.330569] x13: 0000000000007f7a x12: 0000000034155555\n[ 67.330574] x11: 0000000000000001 x10: 0000000000000001\n[ 67.330579] x9 : 0000000000000000 x8 : 0000000000000000\n[ 67.330585] x7 : 0000000000000000 x6 : ffffff80148b5c1a\n[ 67.330590] x5 : ffffff8008013ae0 x4 : 0000000000000001\n[ 67.330596] x3 : ffffff80080139c8 x2 : ffffff801083bab8\n[ 67.330601] x1 : 0000000000000000 x0 : ffffffdada34c970\n[ 67.330609] Call trace:\n[ 67.330616] mempool_free+0x70/0xa0\n[ 67.330627] bio_put+0xf8/0x110\n[ 67.330638] dec_pending+0x13c/0x230\n[ 67.330644] clone_endio+0x90/0x180\n[ 67.330649] bio_endio+0x198/0x1b8\n[ 67.330655] dec_pending+0x190/0x230\n[ 67.330660] clone_endio+0x90/0x180\n[ 67.330665] bio_endio+0x198/0x1b8\n[ 67.330673] blk_update_request+0x214/0x428\n[ 67.330683] scsi_end_request+0x2c/0x300\n[ 67.330688] scsi_io_completion+0xa0/0x710\n[ 67.330695] scsi_finish_command+0xd8/0x110\n[ 67.330700] scsi_softirq_done+0x114/0x148\n[ 67.330708] blk_done_softirq+0x74/0xd0\n[ 67.330716] __do_softirq+0x18c/0x374\n[ 67.330724] irq_exit+0xb4/0xb8\n[ 67.330732] __handle_domain_irq+0x84/0xc0\n[ 67.330737] gic_handle_irq+0x148/0x1b0\n[ 67.330744] el1_irq+0xe8/0x190\n[ 67.330753] lpm_cpuidle_enter+0x4f8/0x538\n[ 67.330759] cpuidle_enter_state+0x1fc/0x398\n[ 67.330764] cpuidle_enter+0x18/0x20\n[ 67.330772] do_idle+0x1b4/0x290\n[ 67.330778] cpu_startup_entry+0x20/0x28\n[ 67.330786] secondary_start_kernel+0x160/0x170\n\nFix this by:\n1) Establishing pointers to \u0027struct dm_io\u0027 members in\ndm_io_dec_pending() so that they may be passed into end_io_acct()\n_after_ free_io() is called.\n2) Moving end_io_acct() after free_io().",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47435",
          "url": "https://www.suse.com/security/cve/CVE-2021-47435"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1225247 for CVE-2021-47435",
          "url": "https://bugzilla.suse.com/1225247"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-24T18:34:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47435"
    },
    {
      "cve": "CVE-2021-47436",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47436"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: musb: dsps: Fix the probe error path\n\nCommit 7c75bde329d7 (\"usb: musb: musb_dsps: request_irq() after\ninitializing musb\") has inverted the calls to\ndsps_setup_optional_vbus_irq() and dsps_create_musb_pdev() without\nupdating correctly the error path. dsps_create_musb_pdev() allocates and\nregisters a new platform device which must be unregistered and freed\nwith platform_device_unregister(), and this is missing upon\ndsps_setup_optional_vbus_irq() error.\n\nWhile on the master branch it seems not to trigger any issue, I observed\na kernel crash because of a NULL pointer dereference with a v5.10.70\nstable kernel where the patch mentioned above was backported. With this\nkernel version, -EPROBE_DEFER is returned the first time\ndsps_setup_optional_vbus_irq() is called which triggers the probe to\nerror out without unregistering the platform device. Unfortunately, on\nthe Beagle Bone Black Wireless, the platform device still living in the\nsystem is being used by the USB Ethernet gadget driver, which during the\nboot phase triggers the crash.\n\nMy limited knowledge of the musb world prevents me to revert this commit\nwhich was sent to silence a robot warning which, as far as I understand,\ndoes not make sense. The goal of this patch was to prevent an IRQ to\nfire before the platform device being registered. I think this cannot\never happen due to the fact that enabling the interrupts is done by the\n-\u003eenable() callback of the platform musb device, and this platform\ndevice must be already registered in order for the core or any other\nuser to use this callback.\n\nHence, I decided to fix the error path, which might prevent future\nerrors on mainline kernels while also fixing older ones.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47436",
          "url": "https://www.suse.com/security/cve/CVE-2021-47436"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1225244 for CVE-2021-47436",
          "url": "https://bugzilla.suse.com/1225244"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-24T18:34:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47436"
    },
    {
      "cve": "CVE-2021-47456",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47456"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncan: peak_pci: peak_pci_remove(): fix UAF\n\nWhen remove the module peek_pci, referencing \u0027chan\u0027 again after\nreleasing \u0027dev\u0027 will cause UAF.\n\nFix this by releasing \u0027dev\u0027 later.\n\nThe following log reveals it:\n\n[   35.961814 ] BUG: KASAN: use-after-free in peak_pci_remove+0x16f/0x270 [peak_pci]\n[   35.963414 ] Read of size 8 at addr ffff888136998ee8 by task modprobe/5537\n[   35.965513 ] Call Trace:\n[   35.965718 ]  dump_stack_lvl+0xa8/0xd1\n[   35.966028 ]  print_address_description+0x87/0x3b0\n[   35.966420 ]  kasan_report+0x172/0x1c0\n[   35.966725 ]  ? peak_pci_remove+0x16f/0x270 [peak_pci]\n[   35.967137 ]  ? trace_irq_enable_rcuidle+0x10/0x170\n[   35.967529 ]  ? peak_pci_remove+0x16f/0x270 [peak_pci]\n[   35.967945 ]  __asan_report_load8_noabort+0x14/0x20\n[   35.968346 ]  peak_pci_remove+0x16f/0x270 [peak_pci]\n[   35.968752 ]  pci_device_remove+0xa9/0x250",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47456",
          "url": "https://www.suse.com/security/cve/CVE-2021-47456"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1225256 for CVE-2021-47456",
          "url": "https://bugzilla.suse.com/1225256"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-24T18:34:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47456"
    },
    {
      "cve": "CVE-2021-47458",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47458"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nocfs2: mount fails with buffer overflow in strlen\n\nStarting with kernel 5.11 built with CONFIG_FORTIFY_SOURCE mouting an\nocfs2 filesystem with either o2cb or pcmk cluster stack fails with the\ntrace below.  Problem seems to be that strings for cluster stack and\ncluster name are not guaranteed to be null terminated in the disk\nrepresentation, while strlcpy assumes that the source string is always\nnull terminated.  This causes a read outside of the source string\ntriggering the buffer overflow detection.\n\n  detected buffer overflow in strlen\n  ------------[ cut here ]------------\n  kernel BUG at lib/string.c:1149!\n  invalid opcode: 0000 [#1] SMP PTI\n  CPU: 1 PID: 910 Comm: mount.ocfs2 Not tainted 5.14.0-1-amd64 #1\n    Debian 5.14.6-2\n  RIP: 0010:fortify_panic+0xf/0x11\n  ...\n  Call Trace:\n   ocfs2_initialize_super.isra.0.cold+0xc/0x18 [ocfs2]\n   ocfs2_fill_super+0x359/0x19b0 [ocfs2]\n   mount_bdev+0x185/0x1b0\n   legacy_get_tree+0x27/0x40\n   vfs_get_tree+0x25/0xb0\n   path_mount+0x454/0xa20\n   __x64_sys_mount+0x103/0x140\n   do_syscall_64+0x3b/0xc0\n   entry_SYSCALL_64_after_hwframe+0x44/0xae",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47458",
          "url": "https://www.suse.com/security/cve/CVE-2021-47458"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1225252 for CVE-2021-47458",
          "url": "https://bugzilla.suse.com/1225252"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-24T18:34:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47458"
    },
    {
      "cve": "CVE-2021-47460",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47460"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nocfs2: fix data corruption after conversion from inline format\n\nCommit 6dbf7bb55598 (\"fs: Don\u0027t invalidate page buffers in\nblock_write_full_page()\") uncovered a latent bug in ocfs2 conversion\nfrom inline inode format to a normal inode format.\n\nThe code in ocfs2_convert_inline_data_to_extents() attempts to zero out\nthe whole cluster allocated for file data by grabbing, zeroing, and\ndirtying all pages covering this cluster.  However these pages are\nbeyond i_size, thus writeback code generally ignores these dirty pages\nand no blocks were ever actually zeroed on the disk.\n\nThis oversight was fixed by commit 693c241a5f6a (\"ocfs2: No need to zero\npages past i_size.\") for standard ocfs2 write path, inline conversion\npath was apparently forgotten; the commit log also has a reasoning why\nthe zeroing actually is not needed.\n\nAfter commit 6dbf7bb55598, things became worse as writeback code stopped\ninvalidating buffers on pages beyond i_size and thus these pages end up\nwith clean PageDirty bit but with buffers attached to these pages being\nstill dirty.  So when a file is converted from inline format, then\nwriteback triggers, and then the file is grown so that these pages\nbecome valid, the invalid dirtiness state is preserved,\nmark_buffer_dirty() does nothing on these pages (buffers are already\ndirty) but page is never written back because it is clean.  So data\nwritten to these pages is lost once pages are reclaimed.\n\nSimple reproducer for the problem is:\n\n  xfs_io -f -c \"pwrite 0 2000\" -c \"pwrite 2000 2000\" -c \"fsync\" \\\n    -c \"pwrite 4000 2000\" ocfs2_file\n\nAfter unmounting and mounting the fs again, you can observe that end of\n\u0027ocfs2_file\u0027 has lost its contents.\n\nFix the problem by not doing the pointless zeroing during conversion\nfrom inline format similarly as in the standard write path.\n\n[akpm@linux-foundation.org: fix whitespace, per Joseph]",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47460",
          "url": "https://www.suse.com/security/cve/CVE-2021-47460"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1225251 for CVE-2021-47460",
          "url": "https://bugzilla.suse.com/1225251"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-24T18:34:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47460"
    },
    {
      "cve": "CVE-2021-47469",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47469"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47469",
          "url": "https://www.suse.com/security/cve/CVE-2021-47469"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1225347 for CVE-2021-47469",
          "url": "https://bugzilla.suse.com/1225347"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-24T18:34:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47469"
    },
    {
      "cve": "CVE-2021-47472",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47472"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47472",
          "url": "https://www.suse.com/security/cve/CVE-2021-47472"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1225189 for CVE-2021-47472",
          "url": "https://bugzilla.suse.com/1225189"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 2.5,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-24T18:34:20Z",
          "details": "low"
        }
      ],
      "title": "CVE-2021-47472"
    },
    {
      "cve": "CVE-2021-47473",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47473"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: qla2xxx: Fix a memory leak in an error path of qla2x00_process_els()\n\nCommit 8c0eb596baa5 (\"[SCSI] qla2xxx: Fix a memory leak in an error path of\nqla2x00_process_els()\"), intended to change:\n\n        bsg_job-\u003erequest-\u003emsgcode == FC_BSG_HST_ELS_NOLOGIN\n\n\n        bsg_job-\u003erequest-\u003emsgcode != FC_BSG_RPT_ELS\n\nbut changed it to:\n\n        bsg_job-\u003erequest-\u003emsgcode == FC_BSG_RPT_ELS\n\ninstead.\n\nChange the == to a != to avoid leaking the fcport structure or freeing\nunallocated memory.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47473",
          "url": "https://www.suse.com/security/cve/CVE-2021-47473"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1225192 for CVE-2021-47473",
          "url": "https://bugzilla.suse.com/1225192"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-24T18:34:20Z",
          "details": "low"
        }
      ],
      "title": "CVE-2021-47473"
    },
    {
      "cve": "CVE-2021-47478",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47478"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nisofs: Fix out of bound access for corrupted isofs image\n\nWhen isofs image is suitably corrupted isofs_read_inode() can read data\nbeyond the end of buffer. Sanity-check the directory entry length before\nusing it.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47478",
          "url": "https://www.suse.com/security/cve/CVE-2021-47478"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1225198 for CVE-2021-47478",
          "url": "https://bugzilla.suse.com/1225198"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-24T18:34:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47478"
    },
    {
      "cve": "CVE-2021-47480",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47480"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: core: Put LLD module refcnt after SCSI device is released\n\nSCSI host release is triggered when SCSI device is freed. We have to make\nsure that the low-level device driver module won\u0027t be unloaded before SCSI\nhost instance is released because shost-\u003ehostt is required in the release\nhandler.\n\nMake sure to put LLD module refcnt after SCSI device is released.\n\nFixes a kernel panic of \u0027BUG: unable to handle page fault for address\u0027\nreported by Changhui and Yi.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47480",
          "url": "https://www.suse.com/security/cve/CVE-2021-47480"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1225322 for CVE-2021-47480",
          "url": "https://bugzilla.suse.com/1225322"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-24T18:34:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47480"
    },
    {
      "cve": "CVE-2021-47483",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47483"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nregmap: Fix possible double-free in regcache_rbtree_exit()\n\nIn regcache_rbtree_insert_to_block(), when \u0027present\u0027 realloc failed,\nthe \u0027blk\u0027 which is supposed to assign to \u0027rbnode-\u003eblock\u0027 will be freed,\nso \u0027rbnode-\u003eblock\u0027 points a freed memory, in the error handling path of\nregcache_rbtree_init(), \u0027rbnode-\u003eblock\u0027 will be freed again in\nregcache_rbtree_exit(), KASAN will report double-free as follows:\n\nBUG: KASAN: double-free or invalid-free in kfree+0xce/0x390\nCall Trace:\n slab_free_freelist_hook+0x10d/0x240\n kfree+0xce/0x390\n regcache_rbtree_exit+0x15d/0x1a0\n regcache_rbtree_init+0x224/0x2c0\n regcache_init+0x88d/0x1310\n __regmap_init+0x3151/0x4a80\n __devm_regmap_init+0x7d/0x100\n madera_spi_probe+0x10f/0x333 [madera_spi]\n spi_probe+0x183/0x210\n really_probe+0x285/0xc30\n\nTo fix this, moving up the assignment of rbnode-\u003eblock to immediately after\nthe reallocation has succeeded so that the data structure stays valid even\nif the second reallocation fails.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47483",
          "url": "https://www.suse.com/security/cve/CVE-2021-47483"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1224907 for CVE-2021-47483",
          "url": "https://bugzilla.suse.com/1224907"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1224908 for CVE-2021-47483",
          "url": "https://bugzilla.suse.com/1224908"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-24T18:34:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47483"
    },
    {
      "cve": "CVE-2021-47485",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47485"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nIB/qib: Protect from buffer overflow in struct qib_user_sdma_pkt fields\n\nOverflowing either addrlimit or bytes_togo can allow userspace to trigger\na buffer overflow of kernel memory. Check for overflows in all the places\ndoing math on user controlled buffers.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47485",
          "url": "https://www.suse.com/security/cve/CVE-2021-47485"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1224904 for CVE-2021-47485",
          "url": "https://bugzilla.suse.com/1224904"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-24T18:34:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47485"
    },
    {
      "cve": "CVE-2021-47495",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47495"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusbnet: sanity check for maxpacket\n\nmaxpacket of 0 makes no sense and oopses as we need to divide\nby it. Give up.\n\nV2: fixed typo in log and stylistic issues",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47495",
          "url": "https://www.suse.com/security/cve/CVE-2021-47495"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1225351 for CVE-2021-47495",
          "url": "https://bugzilla.suse.com/1225351"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-24T18:34:20Z",
          "details": "low"
        }
      ],
      "title": "CVE-2021-47495"
    },
    {
      "cve": "CVE-2021-47496",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47496"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/tls: Fix flipped sign in tls_err_abort() calls\n\nsk-\u003esk_err appears to expect a positive value, a convention that ktls\ndoesn\u0027t always follow and that leads to memory corruption in other code.\nFor instance,\n\n    [kworker]\n    tls_encrypt_done(..., err=\u003cnegative error from crypto request\u003e)\n      tls_err_abort(.., err)\n        sk-\u003esk_err = err;\n\n    [task]\n    splice_from_pipe_feed\n      ...\n        tls_sw_do_sendpage\n          if (sk-\u003esk_err) {\n            ret = -sk-\u003esk_err;  // ret is positive\n\n    splice_from_pipe_feed (continued)\n      ret = actor(...)  // ret is still positive and interpreted as bytes\n                        // written, resulting in underflow of buf-\u003elen and\n                        // sd-\u003elen, leading to huge buf-\u003eoffset and bogus\n                        // addresses computed in later calls to actor()\n\nFix all tls_err_abort() callers to pass a negative error code\nconsistently and centralize the error-prone sign flip there, throwing in\na warning to catch future misuse and uninlining the function so it\nreally does only warn once.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47496",
          "url": "https://www.suse.com/security/cve/CVE-2021-47496"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1225354 for CVE-2021-47496",
          "url": "https://bugzilla.suse.com/1225354"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1227656 for CVE-2021-47496",
          "url": "https://bugzilla.suse.com/1227656"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-24T18:34:20Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-47496"
    },
    {
      "cve": "CVE-2021-47497",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47497"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnvmem: Fix shift-out-of-bound (UBSAN) with byte size cells\n\nIf a cell has \u0027nbits\u0027 equal to a multiple of BITS_PER_BYTE the logic\n\n *p \u0026= GENMASK((cell-\u003enbits%BITS_PER_BYTE) - 1, 0);\n\nwill become undefined behavior because nbits modulo BITS_PER_BYTE is 0, and we\nsubtract one from that making a large number that is then shifted more than the\nnumber of bits that fit into an unsigned long.\n\nUBSAN reports this problem:\n\n UBSAN: shift-out-of-bounds in drivers/nvmem/core.c:1386:8\n shift exponent 64 is too large for 64-bit type \u0027unsigned long\u0027\n CPU: 6 PID: 7 Comm: kworker/u16:0 Not tainted 5.15.0-rc3+ #9\n Hardware name: Google Lazor (rev3+) with KB Backlight (DT)\n Workqueue: events_unbound deferred_probe_work_func\n Call trace:\n  dump_backtrace+0x0/0x170\n  show_stack+0x24/0x30\n  dump_stack_lvl+0x64/0x7c\n  dump_stack+0x18/0x38\n  ubsan_epilogue+0x10/0x54\n  __ubsan_handle_shift_out_of_bounds+0x180/0x194\n  __nvmem_cell_read+0x1ec/0x21c\n  nvmem_cell_read+0x58/0x94\n  nvmem_cell_read_variable_common+0x4c/0xb0\n  nvmem_cell_read_variable_le_u32+0x40/0x100\n  a6xx_gpu_init+0x170/0x2f4\n  adreno_bind+0x174/0x284\n  component_bind_all+0xf0/0x264\n  msm_drm_bind+0x1d8/0x7a0\n  try_to_bring_up_master+0x164/0x1ac\n  __component_add+0xbc/0x13c\n  component_add+0x20/0x2c\n  dp_display_probe+0x340/0x384\n  platform_probe+0xc0/0x100\n  really_probe+0x110/0x304\n  __driver_probe_device+0xb8/0x120\n  driver_probe_device+0x4c/0xfc\n  __device_attach_driver+0xb0/0x128\n  bus_for_each_drv+0x90/0xdc\n  __device_attach+0xc8/0x174\n  device_initial_probe+0x20/0x2c\n  bus_probe_device+0x40/0xa4\n  deferred_probe_work_func+0x7c/0xb8\n  process_one_work+0x128/0x21c\n  process_scheduled_works+0x40/0x54\n  worker_thread+0x1ec/0x2a8\n  kthread+0x138/0x158\n  ret_from_fork+0x10/0x20\n\nFix it by making sure there are any bits to mask out.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47497",
          "url": "https://www.suse.com/security/cve/CVE-2021-47497"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1225355 for CVE-2021-47497",
          "url": "https://bugzilla.suse.com/1225355"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1227655 for CVE-2021-47497",
          "url": "https://bugzilla.suse.com/1227655"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 0,
            "baseSeverity": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-24T18:34:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47497"
    },
    {
      "cve": "CVE-2021-47500",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47500"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\niio: mma8452: Fix trigger reference couting\n\nThe mma8452 driver directly assigns a trigger to the struct iio_dev. The\nIIO core when done using this trigger will call `iio_trigger_put()` to drop\nthe reference count by 1.\n\nWithout the matching `iio_trigger_get()` in the driver the reference count\ncan reach 0 too early, the trigger gets freed while still in use and a\nuse-after-free occurs.\n\nFix this by getting a reference to the trigger before assigning it to the\nIIO device.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47500",
          "url": "https://www.suse.com/security/cve/CVE-2021-47500"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1225360 for CVE-2021-47500",
          "url": "https://bugzilla.suse.com/1225360"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1227698 for CVE-2021-47500",
          "url": "https://bugzilla.suse.com/1227698"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-24T18:34:20Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-47500"
    },
    {
      "cve": "CVE-2021-47506",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47506"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnfsd: fix use-after-free due to delegation race\n\nA delegation break could arrive as soon as we\u0027ve called vfs_setlease.  A\ndelegation break runs a callback which immediately (in\nnfsd4_cb_recall_prepare) adds the delegation to del_recall_lru.  If we\nthen exit nfs4_set_delegation without hashing the delegation, it will be\nfreed as soon as the callback is done with it, without ever being\nremoved from del_recall_lru.\n\nSymptoms show up later as use-after-free or list corruption warnings,\nusually in the laundromat thread.\n\nI suspect aba2072f4523 \"nfsd: grant read delegations to clients holding\nwrites\" made this bug easier to hit, but I looked as far back as v3.0\nand it looks to me it already had the same problem.  So I\u0027m not sure\nwhere the bug was introduced; it may have been there from the beginning.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47506",
          "url": "https://www.suse.com/security/cve/CVE-2021-47506"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1225404 for CVE-2021-47506",
          "url": "https://bugzilla.suse.com/1225404"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1227497 for CVE-2021-47506",
          "url": "https://bugzilla.suse.com/1227497"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-24T18:34:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47506"
    },
    {
      "cve": "CVE-2021-47509",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47509"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: pcm: oss: Limit the period size to 16MB\n\nSet the practical limit to the period size (the fragment shift in OSS)\ninstead of a full 31bit; a too large value could lead to the exhaust\nof memory as we allocate temporary buffers of the period size, too.\n\nAs of this patch, we set to 16MB limit, which should cover all use\ncases.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47509",
          "url": "https://www.suse.com/security/cve/CVE-2021-47509"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1225409 for CVE-2021-47509",
          "url": "https://bugzilla.suse.com/1225409"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-24T18:34:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47509"
    },
    {
      "cve": "CVE-2021-47511",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47511"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: pcm: oss: Fix negative period/buffer sizes\n\nThe period size calculation in OSS layer may receive a negative value\nas an error, but the code there assumes only the positive values and\nhandle them with size_t.  Due to that, a too big value may be passed\nto the lower layers.\n\nThis patch changes the code to handle with ssize_t and adds the proper\nerror checks appropriately.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47511",
          "url": "https://www.suse.com/security/cve/CVE-2021-47511"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1225411 for CVE-2021-47511",
          "url": "https://bugzilla.suse.com/1225411"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1227700 for CVE-2021-47511",
          "url": "https://bugzilla.suse.com/1227700"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-24T18:34:20Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-47511"
    },
    {
      "cve": "CVE-2021-47523",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47523"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nIB/hfi1: Fix leak of rcvhdrtail_dummy_kvaddr\n\nThis buffer is currently allocated in hfi1_init():\n\n\tif (reinit)\n\t\tret = init_after_reset(dd);\n\telse\n\t\tret = loadtime_init(dd);\n\tif (ret)\n\t\tgoto done;\n\n\t/* allocate dummy tail memory for all receive contexts */\n\tdd-\u003ercvhdrtail_dummy_kvaddr = dma_alloc_coherent(\u0026dd-\u003epcidev-\u003edev,\n\t\t\t\t\t\t\t sizeof(u64),\n\t\t\t\t\t\t\t \u0026dd-\u003ercvhdrtail_dummy_dma,\n\t\t\t\t\t\t\t GFP_KERNEL);\n\n\tif (!dd-\u003ercvhdrtail_dummy_kvaddr) {\n\t\tdd_dev_err(dd, \"cannot allocate dummy tail memory\\n\");\n\t\tret = -ENOMEM;\n\t\tgoto done;\n\t}\n\nThe reinit triggered path will overwrite the old allocation and leak it.\n\nFix by moving the allocation to hfi1_alloc_devdata() and the deallocation\nto hfi1_free_devdata().",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47523",
          "url": "https://www.suse.com/security/cve/CVE-2021-47523"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1225438 for CVE-2021-47523",
          "url": "https://bugzilla.suse.com/1225438"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-24T18:34:20Z",
          "details": "low"
        }
      ],
      "title": "CVE-2021-47523"
    },
    {
      "cve": "CVE-2021-47541",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47541"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/mlx4_en: Fix an use-after-free bug in mlx4_en_try_alloc_resources()\n\nIn mlx4_en_try_alloc_resources(), mlx4_en_copy_priv() is called and\ntmp-\u003etx_cq will be freed on the error path of mlx4_en_copy_priv().\nAfter that mlx4_en_alloc_resources() is called and there is a dereference\nof \u0026tmp-\u003etx_cq[t][i] in mlx4_en_alloc_resources(), which could lead to\na use after free problem on failure of mlx4_en_copy_priv().\n\nFix this bug by adding a check of mlx4_en_copy_priv()\n\nThis bug was found by a static analyzer. The analysis employs\ndifferential checking to identify inconsistent security operations\n(e.g., checks or kfrees) between two code paths and confirms that the\ninconsistent operations are not recovered in the current function or\nthe callers, so they constitute bugs.\n\nNote that, as a bug found by static analysis, it can be a false\npositive or hard to trigger. Multiple researchers have cross-reviewed\nthe bug.\n\nBuilds with CONFIG_MLX4_EN=m show no new warnings,\nand our static analyzer no longer warns about this code.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47541",
          "url": "https://www.suse.com/security/cve/CVE-2021-47541"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1225453 for CVE-2021-47541",
          "url": "https://bugzilla.suse.com/1225453"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1225454 for CVE-2021-47541",
          "url": "https://bugzilla.suse.com/1225454"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-24T18:34:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47541"
    },
    {
      "cve": "CVE-2021-47548",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47548"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nethernet: hisilicon: hns: hns_dsaf_misc: fix a possible array overflow in hns_dsaf_ge_srst_by_port()\n\nThe if statement:\n  if (port \u003e= DSAF_GE_NUM)\n        return;\n\nlimits the value of port less than DSAF_GE_NUM (i.e., 8).\nHowever, if the value of port is 6 or 7, an array overflow could occur:\n  port_rst_off = dsaf_dev-\u003emac_cb[port]-\u003eport_rst_off;\n\nbecause the length of dsaf_dev-\u003emac_cb is DSAF_MAX_PORT_NUM (i.e., 6).\n\nTo fix this possible array overflow, we first check port and if it is\ngreater than or equal to DSAF_MAX_PORT_NUM, the function returns.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47548",
          "url": "https://www.suse.com/security/cve/CVE-2021-47548"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1225506 for CVE-2021-47548",
          "url": "https://bugzilla.suse.com/1225506"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.6,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-24T18:34:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47548"
    },
    {
      "cve": "CVE-2021-47565",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47565"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: mpt3sas: Fix kernel panic during drive powercycle test\n\nWhile looping over shost\u0027s sdev list it is possible that one\nof the drives is getting removed and its sas_target object is\nfreed but its sdev object remains intact.\n\nConsequently, a kernel panic can occur while the driver is trying to access\nthe sas_address field of sas_target object without also checking the\nsas_target object for NULL.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47565",
          "url": "https://www.suse.com/security/cve/CVE-2021-47565"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1225384 for CVE-2021-47565",
          "url": "https://bugzilla.suse.com/1225384"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-24T18:34:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47565"
    },
    {
      "cve": "CVE-2022-48636",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-48636"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ns390/dasd: fix Oops in dasd_alias_get_start_dev due to missing pavgroup\n\nFix Oops in dasd_alias_get_start_dev() function caused by the pavgroup\npointer being NULL.\n\nThe pavgroup pointer is checked on the entrance of the function but\nwithout the lcu-\u003elock being held. Therefore there is a race window\nbetween dasd_alias_get_start_dev() and _lcu_update() which sets\npavgroup to NULL with the lcu-\u003elock held.\n\nFix by checking the pavgroup pointer with lcu-\u003elock held.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-48636",
          "url": "https://www.suse.com/security/cve/CVE-2022-48636"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223512 for CVE-2022-48636",
          "url": "https://bugzilla.suse.com/1223512"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-24T18:34:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-48636"
    },
    {
      "cve": "CVE-2022-48650",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-48650"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: qla2xxx: Fix memory leak in __qlt_24xx_handle_abts()\n\nCommit 8f394da36a36 (\"scsi: qla2xxx: Drop TARGET_SCF_LOOKUP_LUN_FROM_TAG\")\nmade the __qlt_24xx_handle_abts() function return early if\ntcm_qla2xxx_find_cmd_by_tag() didn\u0027t find a command, but it missed to clean\nup the allocated memory for the management command.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-48650",
          "url": "https://www.suse.com/security/cve/CVE-2022-48650"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223509 for CVE-2022-48650",
          "url": "https://bugzilla.suse.com/1223509"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-24T18:34:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-48650"
    },
    {
      "cve": "CVE-2022-48672",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-48672"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nof: fdt: fix off-by-one error in unflatten_dt_nodes()\n\nCommit 78c44d910d3e (\"drivers/of: Fix depth when unflattening devicetree\")\nforgot to fix up the depth check in the loop body in unflatten_dt_nodes()\nwhich makes it possible to overflow the nps[] buffer...\n\nFound by Linux Verification Center (linuxtesting.org) with the SVACE static\nanalysis tool.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-48672",
          "url": "https://www.suse.com/security/cve/CVE-2022-48672"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223931 for CVE-2022-48672",
          "url": "https://bugzilla.suse.com/1223931"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-24T18:34:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-48672"
    },
    {
      "cve": "CVE-2022-48686",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-48686"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnvme-tcp: fix UAF when detecting digest errors\n\nWe should also bail from the io_work loop when we set rd_enabled to true,\nso we don\u0027t attempt to read data from the socket when the TCP stream is\nalready out-of-sync or corrupted.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-48686",
          "url": "https://www.suse.com/security/cve/CVE-2022-48686"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223948 for CVE-2022-48686",
          "url": "https://bugzilla.suse.com/1223948"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1226337 for CVE-2022-48686",
          "url": "https://bugzilla.suse.com/1226337"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-24T18:34:20Z",
          "details": "important"
        }
      ],
      "title": "CVE-2022-48686"
    },
    {
      "cve": "CVE-2022-48697",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-48697"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnvmet: fix a use-after-free\n\nFix the following use-after-free complaint triggered by blktests nvme/004:\n\nBUG: KASAN: user-memory-access in blk_mq_complete_request_remote+0xac/0x350\nRead of size 4 at addr 0000607bd1835943 by task kworker/13:1/460\nWorkqueue: nvmet-wq nvme_loop_execute_work [nvme_loop]\nCall Trace:\n show_stack+0x52/0x58\n dump_stack_lvl+0x49/0x5e\n print_report.cold+0x36/0x1e2\n kasan_report+0xb9/0xf0\n __asan_load4+0x6b/0x80\n blk_mq_complete_request_remote+0xac/0x350\n nvme_loop_queue_response+0x1df/0x275 [nvme_loop]\n __nvmet_req_complete+0x132/0x4f0 [nvmet]\n nvmet_req_complete+0x15/0x40 [nvmet]\n nvmet_execute_io_connect+0x18a/0x1f0 [nvmet]\n nvme_loop_execute_work+0x20/0x30 [nvme_loop]\n process_one_work+0x56e/0xa70\n worker_thread+0x2d1/0x640\n kthread+0x183/0x1c0\n ret_from_fork+0x1f/0x30",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-48697",
          "url": "https://www.suse.com/security/cve/CVE-2022-48697"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223922 for CVE-2022-48697",
          "url": "https://bugzilla.suse.com/1223922"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-24T18:34:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-48697"
    },
    {
      "cve": "CVE-2022-48702",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-48702"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: emu10k1: Fix out of bounds access in snd_emu10k1_pcm_channel_alloc()\n\nThe voice allocator sometimes begins allocating from near the end of the\narray and then wraps around, however snd_emu10k1_pcm_channel_alloc()\naccesses the newly allocated voices as if it never wrapped around.\n\nThis results in out of bounds access if the first voice has a high enough\nindex so that first_voice + requested_voice_count \u003e NUM_G (64).\nThe more voices are requested, the more likely it is for this to occur.\n\nThis was initially discovered using PipeWire, however it can be reproduced\nby calling aplay multiple times with 16 channels:\naplay -r 48000 -D plughw:CARD=Live,DEV=3 -c 16 /dev/zero\n\nUBSAN: array-index-out-of-bounds in sound/pci/emu10k1/emupcm.c:127:40\nindex 65 is out of range for type \u0027snd_emu10k1_voice [64]\u0027\nCPU: 1 PID: 31977 Comm: aplay Tainted: G        W IOE      6.0.0-rc2-emu10k1+ #7\nHardware name: ASUSTEK COMPUTER INC P5W DH Deluxe/P5W DH Deluxe, BIOS 3002    07/22/2010\nCall Trace:\n\u003cTASK\u003e\ndump_stack_lvl+0x49/0x63\ndump_stack+0x10/0x16\nubsan_epilogue+0x9/0x3f\n__ubsan_handle_out_of_bounds.cold+0x44/0x49\nsnd_emu10k1_playback_hw_params+0x3bc/0x420 [snd_emu10k1]\nsnd_pcm_hw_params+0x29f/0x600 [snd_pcm]\nsnd_pcm_common_ioctl+0x188/0x1410 [snd_pcm]\n? exit_to_user_mode_prepare+0x35/0x170\n? do_syscall_64+0x69/0x90\n? syscall_exit_to_user_mode+0x26/0x50\n? do_syscall_64+0x69/0x90\n? exit_to_user_mode_prepare+0x35/0x170\nsnd_pcm_ioctl+0x27/0x40 [snd_pcm]\n__x64_sys_ioctl+0x95/0xd0\ndo_syscall_64+0x5c/0x90\n? do_syscall_64+0x69/0x90\n? do_syscall_64+0x69/0x90\nentry_SYSCALL_64_after_hwframe+0x63/0xcd",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-48702",
          "url": "https://www.suse.com/security/cve/CVE-2022-48702"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223923 for CVE-2022-48702",
          "url": "https://bugzilla.suse.com/1223923"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-24T18:34:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-48702"
    },
    {
      "cve": "CVE-2022-48704",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-48704"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/radeon: add a force flush to delay work when radeon\n\nAlthough radeon card fence and wait for gpu to finish processing current batch rings,\nthere is still a corner case that radeon lockup work queue may not be fully flushed,\nand meanwhile the radeon_suspend_kms() function has called pci_set_power_state() to\nput device in D3hot state.\nPer PCI spec rev 4.0 on 5.3.1.4.1 D3hot State.\n\u003e Configuration and Message requests are the only TLPs accepted by a Function in\n\u003e the D3hot state. All other received Requests must be handled as Unsupported Requests,\n\u003e and all received Completions may optionally be handled as Unexpected Completions.\nThis issue will happen in following logs:\nUnable to handle kernel paging request at virtual address 00008800e0008010\nCPU 0 kworker/0:3(131): Oops 0\npc = [\u003cffffffff811bea5c\u003e]  ra = [\u003cffffffff81240844\u003e]  ps = 0000 Tainted: G        W\npc is at si_gpu_check_soft_reset+0x3c/0x240\nra is at si_dma_is_lockup+0x34/0xd0\nv0 = 0000000000000000  t0 = fff08800e0008010  t1 = 0000000000010000\nt2 = 0000000000008010  t3 = fff00007e3c00000  t4 = fff00007e3c00258\nt5 = 000000000000ffff  t6 = 0000000000000001  t7 = fff00007ef078000\ns0 = fff00007e3c016e8  s1 = fff00007e3c00000  s2 = fff00007e3c00018\ns3 = fff00007e3c00000  s4 = fff00007fff59d80  s5 = 0000000000000000\ns6 = fff00007ef07bd98\na0 = fff00007e3c00000  a1 = fff00007e3c016e8  a2 = 0000000000000008\na3 = 0000000000000001  a4 = 8f5c28f5c28f5c29  a5 = ffffffff810f4338\nt8 = 0000000000000275  t9 = ffffffff809b66f8  t10 = ff6769c5d964b800\nt11= 000000000000b886  pv = ffffffff811bea20  at = 0000000000000000\ngp = ffffffff81d89690  sp = 00000000aa814126\nDisabling lock debugging due to kernel taint\nTrace:\n[\u003cffffffff81240844\u003e] si_dma_is_lockup+0x34/0xd0\n[\u003cffffffff81119610\u003e] radeon_fence_check_lockup+0xd0/0x290\n[\u003cffffffff80977010\u003e] process_one_work+0x280/0x550\n[\u003cffffffff80977350\u003e] worker_thread+0x70/0x7c0\n[\u003cffffffff80977410\u003e] worker_thread+0x130/0x7c0\n[\u003cffffffff80982040\u003e] kthread+0x200/0x210\n[\u003cffffffff809772e0\u003e] worker_thread+0x0/0x7c0\n[\u003cffffffff80981f8c\u003e] kthread+0x14c/0x210\n[\u003cffffffff80911658\u003e] ret_from_kernel_thread+0x18/0x20\n[\u003cffffffff80981e40\u003e] kthread+0x0/0x210\n Code: ad3e0008  43f0074a  ad7e0018  ad9e0020  8c3001e8  40230101\n \u003c88210000\u003e 4821ed21\nSo force lockup work queue flush to fix this problem.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-48704",
          "url": "https://www.suse.com/security/cve/CVE-2022-48704"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223932 for CVE-2022-48704",
          "url": "https://bugzilla.suse.com/1223932"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-24T18:34:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-48704"
    },
    {
      "cve": "CVE-2022-48708",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-48708"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\npinctrl: single: fix potential NULL dereference\n\nAdded checking of pointer \"function\" in pcs_set_mux().\npinmux_generic_get_function() can return NULL and the pointer\n\"function\" was dereferenced without checking against NULL.\n\nFound by Linux Verification Center (linuxtesting.org) with SVACE.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-48708",
          "url": "https://www.suse.com/security/cve/CVE-2022-48708"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1224942 for CVE-2022-48708",
          "url": "https://bugzilla.suse.com/1224942"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-24T18:34:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-48708"
    },
    {
      "cve": "CVE-2022-48710",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-48710"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/radeon: fix a possible null pointer dereference\n\nIn radeon_fp_native_mode(), the return value of drm_mode_duplicate()\nis assigned to mode, which will lead to a NULL pointer dereference\non failure of drm_mode_duplicate(). Add a check to avoid npd.\n\nThe failure status of drm_cvt_mode() on the other path is checked too.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-48710",
          "url": "https://www.suse.com/security/cve/CVE-2022-48710"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1225230 for CVE-2022-48710",
          "url": "https://bugzilla.suse.com/1225230"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-24T18:34:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-48710"
    },
    {
      "cve": "CVE-2023-0160",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-0160"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A deadlock flaw was found in the Linux kernel\u0027s BPF subsystem. This flaw allows a local user to potentially crash the system.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-0160",
          "url": "https://www.suse.com/security/cve/CVE-2023-0160"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1209657 for CVE-2023-0160",
          "url": "https://bugzilla.suse.com/1209657"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-24T18:34:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-0160"
    },
    {
      "cve": "CVE-2023-1829",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-1829"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A use-after-free vulnerability in the Linux Kernel traffic control index filter (tcindex) can be exploited to achieve local privilege escalation.  The tcindex_delete function which does not properly deactivate filters in case of a perfect hashes while deleting the underlying structure which can later lead to double freeing the structure.  A local attacker user can use this vulnerability to elevate its privileges to root.\nWe recommend upgrading past commit 8c710f75256bb3cf05ac7b1672c82b92c43f3d28.\n\n",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-1829",
          "url": "https://www.suse.com/security/cve/CVE-2023-1829"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1210335 for CVE-2023-1829",
          "url": "https://bugzilla.suse.com/1210335"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1210619 for CVE-2023-1829",
          "url": "https://bugzilla.suse.com/1210619"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1217444 for CVE-2023-1829",
          "url": "https://bugzilla.suse.com/1217444"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1217531 for CVE-2023-1829",
          "url": "https://bugzilla.suse.com/1217531"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1220886 for CVE-2023-1829",
          "url": "https://bugzilla.suse.com/1220886"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1228311 for CVE-2023-1829",
          "url": "https://bugzilla.suse.com/1228311"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-24T18:34:20Z",
          "details": "important"
        }
      ],
      "title": "CVE-2023-1829"
    },
    {
      "cve": "CVE-2023-42755",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-42755"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A flaw was found in the IPv4 Resource Reservation Protocol (RSVP) classifier in the Linux kernel. The xprt pointer may go beyond the linear part of the skb, leading to an out-of-bounds read in the `rsvp_classify` function. This issue may allow a local user to crash the system and cause a denial of service.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-42755",
          "url": "https://www.suse.com/security/cve/CVE-2023-42755"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1215702 for CVE-2023-42755",
          "url": "https://bugzilla.suse.com/1215702"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-24T18:34:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-42755"
    },
    {
      "cve": "CVE-2023-47233",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-47233"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The brcm80211 component in the Linux kernel through 6.5.10 has a brcmf_cfg80211_detach use-after-free in the device unplugging (disconnect the USB by hotplug) code. For physically proximate attackers with local access, this \"could be exploited in a real world scenario.\" This is related to brcmf_cfg80211_escan_timeout_worker in drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-47233",
          "url": "https://www.suse.com/security/cve/CVE-2023-47233"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1216702 for CVE-2023-47233",
          "url": "https://bugzilla.suse.com/1216702"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1224592 for CVE-2023-47233",
          "url": "https://bugzilla.suse.com/1224592"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-24T18:34:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-47233"
    },
    {
      "cve": "CVE-2023-52527",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-52527"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipv4, ipv6: Fix handling of transhdrlen in __ip{,6}_append_data()\n\nIncluding the transhdrlen in length is a problem when the packet is\npartially filled (e.g. something like send(MSG_MORE) happened previously)\nwhen appending to an IPv4 or IPv6 packet as we don\u0027t want to repeat the\ntransport header or account for it twice.  This can happen under some\ncircumstances, such as splicing into an L2TP socket.\n\nThe symptom observed is a warning in __ip6_append_data():\n\n    WARNING: CPU: 1 PID: 5042 at net/ipv6/ip6_output.c:1800 __ip6_append_data.isra.0+0x1be8/0x47f0 net/ipv6/ip6_output.c:1800\n\nthat occurs when MSG_SPLICE_PAGES is used to append more data to an already\npartially occupied skbuff.  The warning occurs when \u0027copy\u0027 is larger than\nthe amount of data in the message iterator.  This is because the requested\nlength includes the transport header length when it shouldn\u0027t.  This can be\ntriggered by, for example:\n\n        sfd = socket(AF_INET6, SOCK_DGRAM, IPPROTO_L2TP);\n        bind(sfd, ...); // ::1\n        connect(sfd, ...); // ::1 port 7\n        send(sfd, buffer, 4100, MSG_MORE);\n        sendfile(sfd, dfd, NULL, 1024);\n\nFix this by only adding transhdrlen into the length if the write queue is\nempty in l2tp_ip6_sendmsg(), analogously to how UDP does things.\n\nl2tp_ip_sendmsg() looks like it won\u0027t suffer from this problem as it builds\nthe UDP packet itself.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-52527",
          "url": "https://www.suse.com/security/cve/CVE-2023-52527"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1220928 for CVE-2023-52527",
          "url": "https://bugzilla.suse.com/1220928"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-24T18:34:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-52527"
    },
    {
      "cve": "CVE-2023-52586",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-52586"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/msm/dpu: Add mutex lock in control vblank irq\n\nAdd a mutex lock to control vblank irq to synchronize vblank\nenable/disable operations happening from different threads to prevent\nrace conditions while registering/unregistering the vblank irq callback.\n\nv4: -Removed vblank_ctl_lock from dpu_encoder_virt, so it is only a\n    parameter of dpu_encoder_phys.\n    -Switch from atomic refcnt to a simple int counter as mutex has\n    now been added\nv3: Mistakenly did not change wording in last version. It is done now.\nv2: Slightly changed wording of commit message\n\nPatchwork: https://patchwork.freedesktop.org/patch/571854/",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-52586",
          "url": "https://www.suse.com/security/cve/CVE-2023-52586"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1221081 for CVE-2023-52586",
          "url": "https://bugzilla.suse.com/1221081"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-24T18:34:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-52586"
    },
    {
      "cve": "CVE-2023-52591",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-52591"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nreiserfs: Avoid touching renamed directory if parent does not change\n\nThe VFS will not be locking moved directory if its parent does not\nchange. Change reiserfs rename code to avoid touching renamed directory\nif its parent does not change as without locking that can corrupt the\nfilesystem.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-52591",
          "url": "https://www.suse.com/security/cve/CVE-2023-52591"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1221044 for CVE-2023-52591",
          "url": "https://bugzilla.suse.com/1221044"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1221578 for CVE-2023-52591",
          "url": "https://bugzilla.suse.com/1221578"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1221598 for CVE-2023-52591",
          "url": "https://bugzilla.suse.com/1221598"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-24T18:34:20Z",
          "details": "important"
        }
      ],
      "title": "CVE-2023-52591"
    },
    {
      "cve": "CVE-2023-52646",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-52646"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\naio: fix mremap after fork null-deref\n\nCommit e4a0d3e720e7 (\"aio: Make it possible to remap aio ring\") introduced\na null-deref if mremap is called on an old aio mapping after fork as\nmm-\u003eioctx_table will be set to NULL.\n\n[jmoyer@redhat.com: fix 80 column issue]",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-52646",
          "url": "https://www.suse.com/security/cve/CVE-2023-52646"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223432 for CVE-2023-52646",
          "url": "https://bugzilla.suse.com/1223432"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-24T18:34:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-52646"
    },
    {
      "cve": "CVE-2023-52653",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-52653"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nSUNRPC: fix a memleak in gss_import_v2_context\n\nThe ctx-\u003emech_used.data allocated by kmemdup is not freed in neither\ngss_import_v2_context nor it only caller gss_krb5_import_sec_context,\nwhich frees ctx on error.\n\nThus, this patch reform the last call of gss_import_v2_context to the\ngss_krb5_import_ctx_v2, preventing the memleak while keepping the return\nformation.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-52653",
          "url": "https://www.suse.com/security/cve/CVE-2023-52653"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223712 for CVE-2023-52653",
          "url": "https://bugzilla.suse.com/1223712"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-24T18:34:20Z",
          "details": "low"
        }
      ],
      "title": "CVE-2023-52653"
    },
    {
      "cve": "CVE-2023-52655",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-52655"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: aqc111: check packet for fixup for true limit\n\nIf a device sends a packet that is inbetween 0\nand sizeof(u64) the value passed to skb_trim()\nas length will wrap around ending up as some very\nlarge value.\n\nThe driver will then proceed to parse the header\nlocated at that position, which will either oops or\nprocess some random value.\n\nThe fix is to check against sizeof(u64) rather than\n0, which the driver currently does. The issue exists\nsince the introduction of the driver.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-52655",
          "url": "https://www.suse.com/security/cve/CVE-2023-52655"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1217169 for CVE-2023-52655",
          "url": "https://bugzilla.suse.com/1217169"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.6,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-24T18:34:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-52655"
    },
    {
      "cve": "CVE-2023-52664",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-52664"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: atlantic: eliminate double free in error handling logic\n\nDriver has a logic leak in ring data allocation/free,\nwhere aq_ring_free could be called multiple times on same ring,\nif system is under stress and got memory allocation error.\n\nRing pointer was used as an indicator of failure, but this is\nnot correct since only ring data is allocated/deallocated.\nRing itself is an array member.\n\nChanging ring allocation functions to return error code directly.\nThis simplifies error handling and eliminates aq_ring_free\non higher layer.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-52664",
          "url": "https://www.suse.com/security/cve/CVE-2023-52664"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1224747 for CVE-2023-52664",
          "url": "https://bugzilla.suse.com/1224747"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-24T18:34:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-52664"
    },
    {
      "cve": "CVE-2023-52685",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-52685"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-52685",
          "url": "https://www.suse.com/security/cve/CVE-2023-52685"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1224728 for CVE-2023-52685",
          "url": "https://bugzilla.suse.com/1224728"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-24T18:34:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-52685"
    },
    {
      "cve": "CVE-2023-52686",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-52686"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\npowerpc/powernv: Add a null pointer check in opal_event_init()\n\nkasprintf() returns a pointer to dynamically allocated memory\nwhich can be NULL upon failure.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-52686",
          "url": "https://www.suse.com/security/cve/CVE-2023-52686"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1224682 for CVE-2023-52686",
          "url": "https://bugzilla.suse.com/1224682"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-24T18:34:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-52686"
    },
    {
      "cve": "CVE-2023-52691",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-52691"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/pm: fix a double-free in si_dpm_init\n\nWhen the allocation of\nadev-\u003epm.dpm.dyn_state.vddc_dependency_on_dispclk.entries fails,\namdgpu_free_extended_power_table is called to free some fields of adev.\nHowever, when the control flow returns to si_dpm_sw_init, it goes to\nlabel dpm_failed and calls si_dpm_fini, which calls\namdgpu_free_extended_power_table again and free those fields again. Thus\na double-free is triggered.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-52691",
          "url": "https://www.suse.com/security/cve/CVE-2023-52691"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1224607 for CVE-2023-52691",
          "url": "https://bugzilla.suse.com/1224607"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-24T18:34:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-52691"
    },
    {
      "cve": "CVE-2023-52696",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-52696"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\npowerpc/powernv: Add a null pointer check in opal_powercap_init()\n\nkasprintf() returns a pointer to dynamically allocated memory\nwhich can be NULL upon failure.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-52696",
          "url": "https://www.suse.com/security/cve/CVE-2023-52696"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1224601 for CVE-2023-52696",
          "url": "https://bugzilla.suse.com/1224601"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-24T18:34:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-52696"
    },
    {
      "cve": "CVE-2023-52698",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-52698"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncalipso: fix memory leak in netlbl_calipso_add_pass()\n\nIf IPv6 support is disabled at boot (ipv6.disable=1),\nthe calipso_init() -\u003e netlbl_calipso_ops_register() function isn\u0027t called,\nand the netlbl_calipso_ops_get() function always returns NULL.\nIn this case, the netlbl_calipso_add_pass() function allocates memory\nfor the doi_def variable but doesn\u0027t free it with the calipso_doi_free().\n\nBUG: memory leak\nunreferenced object 0xffff888011d68180 (size 64):\n  comm \"syz-executor.1\", pid 10746, jiffies 4295410986 (age 17.928s)\n  hex dump (first 32 bytes):\n    00 00 00 00 02 00 00 00 00 00 00 00 00 00 00 00  ................\n    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................\n  backtrace:\n    [\u003c...\u003e] kmalloc include/linux/slab.h:552 [inline]\n    [\u003c...\u003e] netlbl_calipso_add_pass net/netlabel/netlabel_calipso.c:76 [inline]\n    [\u003c...\u003e] netlbl_calipso_add+0x22e/0x4f0 net/netlabel/netlabel_calipso.c:111\n    [\u003c...\u003e] genl_family_rcv_msg_doit+0x22f/0x330 net/netlink/genetlink.c:739\n    [\u003c...\u003e] genl_family_rcv_msg net/netlink/genetlink.c:783 [inline]\n    [\u003c...\u003e] genl_rcv_msg+0x341/0x5a0 net/netlink/genetlink.c:800\n    [\u003c...\u003e] netlink_rcv_skb+0x14d/0x440 net/netlink/af_netlink.c:2515\n    [\u003c...\u003e] genl_rcv+0x29/0x40 net/netlink/genetlink.c:811\n    [\u003c...\u003e] netlink_unicast_kernel net/netlink/af_netlink.c:1313 [inline]\n    [\u003c...\u003e] netlink_unicast+0x54b/0x800 net/netlink/af_netlink.c:1339\n    [\u003c...\u003e] netlink_sendmsg+0x90a/0xdf0 net/netlink/af_netlink.c:1934\n    [\u003c...\u003e] sock_sendmsg_nosec net/socket.c:651 [inline]\n    [\u003c...\u003e] sock_sendmsg+0x157/0x190 net/socket.c:671\n    [\u003c...\u003e] ____sys_sendmsg+0x712/0x870 net/socket.c:2342\n    [\u003c...\u003e] ___sys_sendmsg+0xf8/0x170 net/socket.c:2396\n    [\u003c...\u003e] __sys_sendmsg+0xea/0x1b0 net/socket.c:2429\n    [\u003c...\u003e] do_syscall_64+0x30/0x40 arch/x86/entry/common.c:46\n    [\u003c...\u003e] entry_SYSCALL_64_after_hwframe+0x61/0xc6\n\nFound by InfoTeCS on behalf of Linux Verification Center\n(linuxtesting.org) with Syzkaller\n\n[PM: merged via the LSM tree at Jakub Kicinski request]",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-52698",
          "url": "https://www.suse.com/security/cve/CVE-2023-52698"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1224621 for CVE-2023-52698",
          "url": "https://bugzilla.suse.com/1224621"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.4,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-24T18:34:20Z",
          "details": "low"
        }
      ],
      "title": "CVE-2023-52698"
    },
    {
      "cve": "CVE-2023-52703",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-52703"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/usb: kalmia: Don\u0027t pass act_len in usb_bulk_msg error path\n\nsyzbot reported that act_len in kalmia_send_init_packet() is\nuninitialized when passing it to the first usb_bulk_msg error path. Jiri\nPirko noted that it\u0027s pointless to pass it in the error path, and that\nthe value that would be printed in the second error path would be the\nvalue of act_len from the first call to usb_bulk_msg.[1]\n\nWith this in mind, let\u0027s just not pass act_len to the usb_bulk_msg error\npaths.\n\n1: https://lore.kernel.org/lkml/Y9pY61y1nwTuzMOa@nanopsycho/",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-52703",
          "url": "https://www.suse.com/security/cve/CVE-2023-52703"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1225549 for CVE-2023-52703",
          "url": "https://bugzilla.suse.com/1225549"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-24T18:34:20Z",
          "details": "low"
        }
      ],
      "title": "CVE-2023-52703"
    },
    {
      "cve": "CVE-2023-52730",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-52730"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmmc: sdio: fix possible resource leaks in some error paths\n\nIf sdio_add_func() or sdio_init_func() fails, sdio_remove_func() can\nnot release the resources, because the sdio function is not presented\nin these two cases, it won\u0027t call of_node_put() or put_device().\n\nTo fix these leaks, make sdio_func_present() only control whether\ndevice_del() needs to be called or not, then always call of_node_put()\nand put_device().\n\nIn error case in sdio_init_func(), the reference of \u0027card-\u003edev\u0027 is\nnot get, to avoid redundant put in sdio_free_func_cis(), move the\nget_device() to sdio_alloc_func() and put_device() to sdio_release_func(),\nit can keep the get/put function be balanced.\n\nWithout this patch, while doing fault inject test, it can get the\nfollowing leak reports, after this fix, the leak is gone.\n\nunreferenced object 0xffff888112514000 (size 2048):\n  comm \"kworker/3:2\", pid 65, jiffies 4294741614 (age 124.774s)\n  hex dump (first 32 bytes):\n    00 e0 6f 12 81 88 ff ff 60 58 8d 06 81 88 ff ff  ..o.....`X......\n    10 40 51 12 81 88 ff ff 10 40 51 12 81 88 ff ff  .@Q......@Q.....\n  backtrace:\n    [\u003c000000009e5931da\u003e] kmalloc_trace+0x21/0x110\n    [\u003c000000002f839ccb\u003e] mmc_alloc_card+0x38/0xb0 [mmc_core]\n    [\u003c0000000004adcbf6\u003e] mmc_sdio_init_card+0xde/0x170 [mmc_core]\n    [\u003c000000007538fea0\u003e] mmc_attach_sdio+0xcb/0x1b0 [mmc_core]\n    [\u003c00000000d4fdeba7\u003e] mmc_rescan+0x54a/0x640 [mmc_core]\n\nunreferenced object 0xffff888112511000 (size 2048):\n  comm \"kworker/3:2\", pid 65, jiffies 4294741623 (age 124.766s)\n  hex dump (first 32 bytes):\n    00 40 51 12 81 88 ff ff e0 58 8d 06 81 88 ff ff  .@Q......X......\n    10 10 51 12 81 88 ff ff 10 10 51 12 81 88 ff ff  ..Q.......Q.....\n  backtrace:\n    [\u003c000000009e5931da\u003e] kmalloc_trace+0x21/0x110\n    [\u003c00000000fcbe706c\u003e] sdio_alloc_func+0x35/0x100 [mmc_core]\n    [\u003c00000000c68f4b50\u003e] mmc_attach_sdio.cold.18+0xb1/0x395 [mmc_core]\n    [\u003c00000000d4fdeba7\u003e] mmc_rescan+0x54a/0x640 [mmc_core]",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-52730",
          "url": "https://www.suse.com/security/cve/CVE-2023-52730"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1224956 for CVE-2023-52730",
          "url": "https://bugzilla.suse.com/1224956"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-24T18:34:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-52730"
    },
    {
      "cve": "CVE-2023-52732",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-52732"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nceph: blocklist the kclient when receiving corrupted snap trace\n\nWhen received corrupted snap trace we don\u0027t know what exactly has\nhappened in MDS side. And we shouldn\u0027t continue IOs and metadatas\naccess to MDS, which may corrupt or get incorrect contents.\n\nThis patch will just block all the further IO/MDS requests\nimmediately and then evict the kclient itself.\n\nThe reason why we still need to evict the kclient just after\nblocking all the further IOs is that the MDS could revoke the caps\nfaster.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-52732",
          "url": "https://www.suse.com/security/cve/CVE-2023-52732"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1225222 for CVE-2023-52732",
          "url": "https://bugzilla.suse.com/1225222"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-24T18:34:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-52732"
    },
    {
      "cve": "CVE-2023-52741",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-52741"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncifs: Fix use-after-free in rdata-\u003eread_into_pages()\n\nWhen the network status is unstable, use-after-free may occur when\nread data from the server.\n\n  BUG: KASAN: use-after-free in readpages_fill_pages+0x14c/0x7e0\n\n  Call Trace:\n   \u003cTASK\u003e\n   dump_stack_lvl+0x38/0x4c\n   print_report+0x16f/0x4a6\n   kasan_report+0xb7/0x130\n   readpages_fill_pages+0x14c/0x7e0\n   cifs_readv_receive+0x46d/0xa40\n   cifs_demultiplex_thread+0x121c/0x1490\n   kthread+0x16b/0x1a0\n   ret_from_fork+0x2c/0x50\n   \u003c/TASK\u003e\n\n  Allocated by task 2535:\n   kasan_save_stack+0x22/0x50\n   kasan_set_track+0x25/0x30\n   __kasan_kmalloc+0x82/0x90\n   cifs_readdata_direct_alloc+0x2c/0x110\n   cifs_readdata_alloc+0x2d/0x60\n   cifs_readahead+0x393/0xfe0\n   read_pages+0x12f/0x470\n   page_cache_ra_unbounded+0x1b1/0x240\n   filemap_get_pages+0x1c8/0x9a0\n   filemap_read+0x1c0/0x540\n   cifs_strict_readv+0x21b/0x240\n   vfs_read+0x395/0x4b0\n   ksys_read+0xb8/0x150\n   do_syscall_64+0x3f/0x90\n   entry_SYSCALL_64_after_hwframe+0x72/0xdc\n\n  Freed by task 79:\n   kasan_save_stack+0x22/0x50\n   kasan_set_track+0x25/0x30\n   kasan_save_free_info+0x2e/0x50\n   __kasan_slab_free+0x10e/0x1a0\n   __kmem_cache_free+0x7a/0x1a0\n   cifs_readdata_release+0x49/0x60\n   process_one_work+0x46c/0x760\n   worker_thread+0x2a4/0x6f0\n   kthread+0x16b/0x1a0\n   ret_from_fork+0x2c/0x50\n\n  Last potentially related work creation:\n   kasan_save_stack+0x22/0x50\n   __kasan_record_aux_stack+0x95/0xb0\n   insert_work+0x2b/0x130\n   __queue_work+0x1fe/0x660\n   queue_work_on+0x4b/0x60\n   smb2_readv_callback+0x396/0x800\n   cifs_abort_connection+0x474/0x6a0\n   cifs_reconnect+0x5cb/0xa50\n   cifs_readv_from_socket.cold+0x22/0x6c\n   cifs_read_page_from_socket+0xc1/0x100\n   readpages_fill_pages.cold+0x2f/0x46\n   cifs_readv_receive+0x46d/0xa40\n   cifs_demultiplex_thread+0x121c/0x1490\n   kthread+0x16b/0x1a0\n   ret_from_fork+0x2c/0x50\n\nThe following function calls will cause UAF of the rdata pointer.\n\nreadpages_fill_pages\n cifs_read_page_from_socket\n  cifs_readv_from_socket\n   cifs_reconnect\n    __cifs_reconnect\n     cifs_abort_connection\n      mid-\u003ecallback() --\u003e smb2_readv_callback\n       queue_work(\u0026rdata-\u003ework)  # if the worker completes first,\n                                 # the rdata is freed\n          cifs_readv_complete\n            kref_put\n              cifs_readdata_release\n                kfree(rdata)\n return rdata-\u003e...               # UAF in readpages_fill_pages()\n\nSimilarly, this problem also occurs in the uncache_fill_pages().\n\nFix this by adjusts the order of condition judgment in the return\nstatement.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-52741",
          "url": "https://www.suse.com/security/cve/CVE-2023-52741"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1225479 for CVE-2023-52741",
          "url": "https://bugzilla.suse.com/1225479"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-24T18:34:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-52741"
    },
    {
      "cve": "CVE-2023-52742",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-52742"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: USB: Fix wrong-direction WARNING in plusb.c\n\nThe syzbot fuzzer detected a bug in the plusb network driver: A\nzero-length control-OUT transfer was treated as a read instead of a\nwrite.  In modern kernels this error provokes a WARNING:\n\nusb 1-1: BOGUS control dir, pipe 80000280 doesn\u0027t match bRequestType c0\nWARNING: CPU: 0 PID: 4645 at drivers/usb/core/urb.c:411\nusb_submit_urb+0x14a7/0x1880 drivers/usb/core/urb.c:411\nModules linked in:\nCPU: 1 PID: 4645 Comm: dhcpcd Not tainted\n6.2.0-rc6-syzkaller-00050-g9f266ccaa2f5 #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google\n01/12/2023\nRIP: 0010:usb_submit_urb+0x14a7/0x1880 drivers/usb/core/urb.c:411\n...\nCall Trace:\n \u003cTASK\u003e\n usb_start_wait_urb+0x101/0x4b0 drivers/usb/core/message.c:58\n usb_internal_control_msg drivers/usb/core/message.c:102 [inline]\n usb_control_msg+0x320/0x4a0 drivers/usb/core/message.c:153\n __usbnet_read_cmd+0xb9/0x390 drivers/net/usb/usbnet.c:2010\n usbnet_read_cmd+0x96/0xf0 drivers/net/usb/usbnet.c:2068\n pl_vendor_req drivers/net/usb/plusb.c:60 [inline]\n pl_set_QuickLink_features drivers/net/usb/plusb.c:75 [inline]\n pl_reset+0x2f/0xf0 drivers/net/usb/plusb.c:85\n usbnet_open+0xcc/0x5d0 drivers/net/usb/usbnet.c:889\n __dev_open+0x297/0x4d0 net/core/dev.c:1417\n __dev_change_flags+0x587/0x750 net/core/dev.c:8530\n dev_change_flags+0x97/0x170 net/core/dev.c:8602\n devinet_ioctl+0x15a2/0x1d70 net/ipv4/devinet.c:1147\n inet_ioctl+0x33f/0x380 net/ipv4/af_inet.c:979\n sock_do_ioctl+0xcc/0x230 net/socket.c:1169\n sock_ioctl+0x1f8/0x680 net/socket.c:1286\n vfs_ioctl fs/ioctl.c:51 [inline]\n __do_sys_ioctl fs/ioctl.c:870 [inline]\n __se_sys_ioctl fs/ioctl.c:856 [inline]\n __x64_sys_ioctl+0x197/0x210 fs/ioctl.c:856\n do_syscall_x64 arch/x86/entry/common.c:50 [inline]\n do_syscall_64+0x39/0xb0 arch/x86/entry/common.c:80\n entry_SYSCALL_64_after_hwframe+0x63/0xcd\n\nThe fix is to call usbnet_write_cmd() instead of usbnet_read_cmd() and\nremove the USB_DIR_IN flag.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-52742",
          "url": "https://www.suse.com/security/cve/CVE-2023-52742"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1225482 for CVE-2023-52742",
          "url": "https://bugzilla.suse.com/1225482"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-24T18:34:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-52742"
    },
    {
      "cve": "CVE-2023-52747",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-52747"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nIB/hfi1: Restore allocated resources on failed copyout\n\nFix a resource leak if an error occurs.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-52747",
          "url": "https://www.suse.com/security/cve/CVE-2023-52747"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1224931 for CVE-2023-52747",
          "url": "https://bugzilla.suse.com/1224931"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-24T18:34:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-52747"
    },
    {
      "cve": "CVE-2023-52759",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-52759"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-52759",
          "url": "https://www.suse.com/security/cve/CVE-2023-52759"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1225560 for CVE-2023-52759",
          "url": "https://bugzilla.suse.com/1225560"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-24T18:34:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-52759"
    },
    {
      "cve": "CVE-2023-52774",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-52774"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ns390/dasd: protect device queue against concurrent access\n\nIn dasd_profile_start() the amount of requests on the device queue are\ncounted. The access to the device queue is unprotected against\nconcurrent access. With a lot of parallel I/O, especially with alias\ndevices enabled, the device queue can change while dasd_profile_start()\nis accessing the queue. In the worst case this leads to a kernel panic\ndue to incorrect pointer accesses.\n\nFix this by taking the device lock before accessing the queue and\ncounting the requests. Additionally the check for a valid profile data\npointer can be done earlier to avoid unnecessary locking in a hot path.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-52774",
          "url": "https://www.suse.com/security/cve/CVE-2023-52774"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1225572 for CVE-2023-52774",
          "url": "https://bugzilla.suse.com/1225572"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-24T18:34:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-52774"
    },
    {
      "cve": "CVE-2023-52781",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-52781"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: config: fix iteration issue in \u0027usb_get_bos_descriptor()\u0027\n\nThe BOS descriptor defines a root descriptor and is the base descriptor for\naccessing a family of related descriptors.\n\nFunction \u0027usb_get_bos_descriptor()\u0027 encounters an iteration issue when\nskipping the \u0027USB_DT_DEVICE_CAPABILITY\u0027 descriptor type. This results in\nthe same descriptor being read repeatedly.\n\nTo address this issue, a \u0027goto\u0027 statement is introduced to ensure that the\npointer and the amount read is updated correctly. This ensures that the\nfunction iterates to the next descriptor instead of reading the same\ndescriptor repeatedly.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-52781",
          "url": "https://www.suse.com/security/cve/CVE-2023-52781"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1225092 for CVE-2023-52781",
          "url": "https://bugzilla.suse.com/1225092"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-24T18:34:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-52781"
    },
    {
      "cve": "CVE-2023-52796",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-52796"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipvlan: add ipvlan_route_v6_outbound() helper\n\nInspired by syzbot reports using a stack of multiple ipvlan devices.\n\nReduce stack size needed in ipvlan_process_v6_outbound() by moving\nthe flowi6 struct used for the route lookup in an non inlined\nhelper. ipvlan_route_v6_outbound() needs 120 bytes on the stack,\nimmediately reclaimed.\n\nAlso make sure ipvlan_process_v4_outbound() is not inlined.\n\nWe might also have to lower MAX_NEST_DEV, because only syzbot uses\nsetups with more than four stacked devices.\n\nBUG: TASK stack guard page was hit at ffffc9000e803ff8 (stack is ffffc9000e804000..ffffc9000e808000)\nstack guard page: 0000 [#1] SMP KASAN\nCPU: 0 PID: 13442 Comm: syz-executor.4 Not tainted 6.1.52-syzkaller #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/09/2023\nRIP: 0010:kasan_check_range+0x4/0x2a0 mm/kasan/generic.c:188\nCode: 48 01 c6 48 89 c7 e8 db 4e c1 03 31 c0 5d c3 cc 0f 0b eb 02 0f 0b b8 ea ff ff ff 5d c3 cc 00 00 cc cc 00 00 cc cc 55 48 89 e5 \u003c41\u003e 57 41 56 41 55 41 54 53 b0 01 48 85 f6 0f 84 a4 01 00 00 48 89\nRSP: 0018:ffffc9000e804000 EFLAGS: 00010246\nRAX: 0000000000000000 RBX: 0000000000000000 RCX: ffffffff817e5bf2\nRDX: 0000000000000000 RSI: 0000000000000008 RDI: ffffffff887c6568\nRBP: ffffc9000e804000 R08: 0000000000000000 R09: 0000000000000000\nR10: 0000000000000000 R11: dffffc0000000001 R12: 1ffff92001d0080c\nR13: dffffc0000000000 R14: ffffffff87e6b100 R15: 0000000000000000\nFS: 00007fd0c55826c0(0000) GS:ffff8881f6800000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: ffffc9000e803ff8 CR3: 0000000170ef7000 CR4: 00000000003506f0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\nCall Trace:\n\u003c#DF\u003e\n\u003c/#DF\u003e\n\u003cTASK\u003e\n[\u003cffffffff81f281d1\u003e] __kasan_check_read+0x11/0x20 mm/kasan/shadow.c:31\n[\u003cffffffff817e5bf2\u003e] instrument_atomic_read include/linux/instrumented.h:72 [inline]\n[\u003cffffffff817e5bf2\u003e] _test_bit include/asm-generic/bitops/instrumented-non-atomic.h:141 [inline]\n[\u003cffffffff817e5bf2\u003e] cpumask_test_cpu include/linux/cpumask.h:506 [inline]\n[\u003cffffffff817e5bf2\u003e] cpu_online include/linux/cpumask.h:1092 [inline]\n[\u003cffffffff817e5bf2\u003e] trace_lock_acquire include/trace/events/lock.h:24 [inline]\n[\u003cffffffff817e5bf2\u003e] lock_acquire+0xe2/0x590 kernel/locking/lockdep.c:5632\n[\u003cffffffff8563221e\u003e] rcu_lock_acquire+0x2e/0x40 include/linux/rcupdate.h:306\n[\u003cffffffff8561464d\u003e] rcu_read_lock include/linux/rcupdate.h:747 [inline]\n[\u003cffffffff8561464d\u003e] ip6_pol_route+0x15d/0x1440 net/ipv6/route.c:2221\n[\u003cffffffff85618120\u003e] ip6_pol_route_output+0x50/0x80 net/ipv6/route.c:2606\n[\u003cffffffff856f65b5\u003e] pol_lookup_func include/net/ip6_fib.h:584 [inline]\n[\u003cffffffff856f65b5\u003e] fib6_rule_lookup+0x265/0x620 net/ipv6/fib6_rules.c:116\n[\u003cffffffff85618009\u003e] ip6_route_output_flags_noref+0x2d9/0x3a0 net/ipv6/route.c:2638\n[\u003cffffffff8561821a\u003e] ip6_route_output_flags+0xca/0x340 net/ipv6/route.c:2651\n[\u003cffffffff838bd5a3\u003e] ip6_route_output include/net/ip6_route.h:100 [inline]\n[\u003cffffffff838bd5a3\u003e] ipvlan_process_v6_outbound drivers/net/ipvlan/ipvlan_core.c:473 [inline]\n[\u003cffffffff838bd5a3\u003e] ipvlan_process_outbound drivers/net/ipvlan/ipvlan_core.c:529 [inline]\n[\u003cffffffff838bd5a3\u003e] ipvlan_xmit_mode_l3 drivers/net/ipvlan/ipvlan_core.c:602 [inline]\n[\u003cffffffff838bd5a3\u003e] ipvlan_queue_xmit+0xc33/0x1be0 drivers/net/ipvlan/ipvlan_core.c:677\n[\u003cffffffff838c2909\u003e] ipvlan_start_xmit+0x49/0x100 drivers/net/ipvlan/ipvlan_main.c:229\n[\u003cffffffff84d03900\u003e] netdev_start_xmit include/linux/netdevice.h:4966 [inline]\n[\u003cffffffff84d03900\u003e] xmit_one net/core/dev.c:3644 [inline]\n[\u003cffffffff84d03900\u003e] dev_hard_start_xmit+0x320/0x980 net/core/dev.c:3660\n[\u003cffffffff84d080e2\u003e] __dev_queue_xmit+0x16b2/0x3370 net/core/dev.c:4324\n[\u003cffffffff855ce4cd\u003e] dev_queue_xmit include/linux/netdevice.h:3067 [inline]\n[\u003cffffffff855ce4cd\u003e] neigh_hh_output include/net/neighbour.h:529 [inline]\n[\u003cf\n---truncated---",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-52796",
          "url": "https://www.suse.com/security/cve/CVE-2023-52796"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1224930 for CVE-2023-52796",
          "url": "https://bugzilla.suse.com/1224930"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-24T18:34:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-52796"
    },
    {
      "cve": "CVE-2023-52803",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-52803"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nSUNRPC: Fix RPC client cleaned up the freed pipefs dentries\n\nRPC client pipefs dentries cleanup is in separated rpc_remove_pipedir()\nworkqueue,which takes care about pipefs superblock locking.\nIn some special scenarios, when kernel frees the pipefs sb of the\ncurrent client and immediately alloctes a new pipefs sb,\nrpc_remove_pipedir function would misjudge the existence of pipefs\nsb which is not the one it used to hold. As a result,\nthe rpc_remove_pipedir would clean the released freed pipefs dentries.\n\nTo fix this issue, rpc_remove_pipedir should check whether the\ncurrent pipefs sb is consistent with the original pipefs sb.\n\nThis error can be catched by KASAN:\n=========================================================\n[  250.497700] BUG: KASAN: slab-use-after-free in dget_parent+0x195/0x200\n[  250.498315] Read of size 4 at addr ffff88800a2ab804 by task kworker/0:18/106503\n[  250.500549] Workqueue: events rpc_free_client_work\n[  250.501001] Call Trace:\n[  250.502880]  kasan_report+0xb6/0xf0\n[  250.503209]  ? dget_parent+0x195/0x200\n[  250.503561]  dget_parent+0x195/0x200\n[  250.503897]  ? __pfx_rpc_clntdir_depopulate+0x10/0x10\n[  250.504384]  rpc_rmdir_depopulate+0x1b/0x90\n[  250.504781]  rpc_remove_client_dir+0xf5/0x150\n[  250.505195]  rpc_free_client_work+0xe4/0x230\n[  250.505598]  process_one_work+0x8ee/0x13b0\n...\n[   22.039056] Allocated by task 244:\n[   22.039390]  kasan_save_stack+0x22/0x50\n[   22.039758]  kasan_set_track+0x25/0x30\n[   22.040109]  __kasan_slab_alloc+0x59/0x70\n[   22.040487]  kmem_cache_alloc_lru+0xf0/0x240\n[   22.040889]  __d_alloc+0x31/0x8e0\n[   22.041207]  d_alloc+0x44/0x1f0\n[   22.041514]  __rpc_lookup_create_exclusive+0x11c/0x140\n[   22.041987]  rpc_mkdir_populate.constprop.0+0x5f/0x110\n[   22.042459]  rpc_create_client_dir+0x34/0x150\n[   22.042874]  rpc_setup_pipedir_sb+0x102/0x1c0\n[   22.043284]  rpc_client_register+0x136/0x4e0\n[   22.043689]  rpc_new_client+0x911/0x1020\n[   22.044057]  rpc_create_xprt+0xcb/0x370\n[   22.044417]  rpc_create+0x36b/0x6c0\n...\n[   22.049524] Freed by task 0:\n[   22.049803]  kasan_save_stack+0x22/0x50\n[   22.050165]  kasan_set_track+0x25/0x30\n[   22.050520]  kasan_save_free_info+0x2b/0x50\n[   22.050921]  __kasan_slab_free+0x10e/0x1a0\n[   22.051306]  kmem_cache_free+0xa5/0x390\n[   22.051667]  rcu_core+0x62c/0x1930\n[   22.051995]  __do_softirq+0x165/0x52a\n[   22.052347]\n[   22.052503] Last potentially related work creation:\n[   22.052952]  kasan_save_stack+0x22/0x50\n[   22.053313]  __kasan_record_aux_stack+0x8e/0xa0\n[   22.053739]  __call_rcu_common.constprop.0+0x6b/0x8b0\n[   22.054209]  dentry_free+0xb2/0x140\n[   22.054540]  __dentry_kill+0x3be/0x540\n[   22.054900]  shrink_dentry_list+0x199/0x510\n[   22.055293]  shrink_dcache_parent+0x190/0x240\n[   22.055703]  do_one_tree+0x11/0x40\n[   22.056028]  shrink_dcache_for_umount+0x61/0x140\n[   22.056461]  generic_shutdown_super+0x70/0x590\n[   22.056879]  kill_anon_super+0x3a/0x60\n[   22.057234]  rpc_kill_sb+0x121/0x200",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-52803",
          "url": "https://www.suse.com/security/cve/CVE-2023-52803"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1225008 for CVE-2023-52803",
          "url": "https://bugzilla.suse.com/1225008"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-24T18:34:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-52803"
    },
    {
      "cve": "CVE-2023-52821",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-52821"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/panel: fix a possible null pointer dereference\n\nIn versatile_panel_get_modes(), the return value of drm_mode_duplicate()\nis assigned to mode, which will lead to a NULL pointer dereference\non failure of drm_mode_duplicate(). Add a check to avoid npd.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-52821",
          "url": "https://www.suse.com/security/cve/CVE-2023-52821"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1225022 for CVE-2023-52821",
          "url": "https://bugzilla.suse.com/1225022"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-24T18:34:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-52821"
    },
    {
      "cve": "CVE-2023-52864",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-52864"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nplatform/x86: wmi: Fix opening of char device\n\nSince commit fa1f68db6ca7 (\"drivers: misc: pass miscdevice pointer via\nfile private data\"), the miscdevice stores a pointer to itself inside\nfilp-\u003eprivate_data, which means that private_data will not be NULL when\nwmi_char_open() is called. This might cause memory corruption should\nwmi_char_open() be unable to find its driver, something which can\nhappen when the associated WMI device is deleted in wmi_free_devices().\n\nFix the problem by using the miscdevice pointer to retrieve the WMI\ndevice data associated with a char device using container_of(). This\nalso avoids wmi_char_open() picking a wrong WMI device bound to a\ndriver with the same name as the original driver.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-52864",
          "url": "https://www.suse.com/security/cve/CVE-2023-52864"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1225132 for CVE-2023-52864",
          "url": "https://bugzilla.suse.com/1225132"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-24T18:34:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-52864"
    },
    {
      "cve": "CVE-2023-52865",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-52865"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nclk: mediatek: clk-mt6797: Add check for mtk_alloc_clk_data\n\nAdd the check for the return value of mtk_alloc_clk_data() in order to\navoid NULL pointer dereference.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-52865",
          "url": "https://www.suse.com/security/cve/CVE-2023-52865"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1225086 for CVE-2023-52865",
          "url": "https://bugzilla.suse.com/1225086"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-24T18:34:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-52865"
    },
    {
      "cve": "CVE-2023-52867",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-52867"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/radeon: possible buffer overflow\n\nBuffer \u0027afmt_status\u0027 of size 6 could overflow, since index \u0027afmt_idx\u0027 is\nchecked after access.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-52867",
          "url": "https://www.suse.com/security/cve/CVE-2023-52867"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1225009 for CVE-2023-52867",
          "url": "https://bugzilla.suse.com/1225009"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-24T18:34:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-52867"
    },
    {
      "cve": "CVE-2023-52875",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-52875"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nclk: mediatek: clk-mt2701: Add check for mtk_alloc_clk_data\n\nAdd the check for the return value of mtk_alloc_clk_data() in order to\navoid NULL pointer dereference.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-52875",
          "url": "https://www.suse.com/security/cve/CVE-2023-52875"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1225096 for CVE-2023-52875",
          "url": "https://bugzilla.suse.com/1225096"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-24T18:34:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-52875"
    },
    {
      "cve": "CVE-2023-52880",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-52880"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntty: n_gsm: require CAP_NET_ADMIN to attach N_GSM0710 ldisc\n\nAny unprivileged user can attach N_GSM0710 ldisc, but it requires\nCAP_NET_ADMIN to create a GSM network anyway.\n\nRequire initial namespace CAP_NET_ADMIN to do that.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-52880",
          "url": "https://www.suse.com/security/cve/CVE-2023-52880"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222619 for CVE-2023-52880",
          "url": "https://bugzilla.suse.com/1222619"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.4,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-24T18:34:20Z",
          "details": "important"
        }
      ],
      "title": "CVE-2023-52880"
    },
    {
      "cve": "CVE-2024-0639",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-0639"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A denial of service vulnerability due to a deadlock was found in sctp_auto_asconf_init in net/sctp/socket.c in the Linux kernel\u0027s SCTP subsystem. This flaw allows guests with local user privileges to trigger a deadlock and potentially crash the system.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-0639",
          "url": "https://www.suse.com/security/cve/CVE-2024-0639"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1218917 for CVE-2024-0639",
          "url": "https://bugzilla.suse.com/1218917"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-24T18:34:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-0639"
    },
    {
      "cve": "CVE-2024-26625",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26625"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nllc: call sock_orphan() at release time\n\nsyzbot reported an interesting trace [1] caused by a stale sk-\u003esk_wq\npointer in a closed llc socket.\n\nIn commit ff7b11aa481f (\"net: socket: set sock-\u003esk to NULL after\ncalling proto_ops::release()\") Eric Biggers hinted that some protocols\nare missing a sock_orphan(), we need to perform a full audit.\n\nIn net-next, I plan to clear sock-\u003esk from sock_orphan() and\namend Eric patch to add a warning.\n\n[1]\n BUG: KASAN: slab-use-after-free in list_empty include/linux/list.h:373 [inline]\n BUG: KASAN: slab-use-after-free in waitqueue_active include/linux/wait.h:127 [inline]\n BUG: KASAN: slab-use-after-free in sock_def_write_space_wfree net/core/sock.c:3384 [inline]\n BUG: KASAN: slab-use-after-free in sock_wfree+0x9a8/0x9d0 net/core/sock.c:2468\nRead of size 8 at addr ffff88802f4fc880 by task ksoftirqd/1/27\n\nCPU: 1 PID: 27 Comm: ksoftirqd/1 Not tainted 6.8.0-rc1-syzkaller-00049-g6098d87eaf31 #0\nHardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.2-debian-1.16.2-1 04/01/2014\nCall Trace:\n \u003cTASK\u003e\n  __dump_stack lib/dump_stack.c:88 [inline]\n  dump_stack_lvl+0xd9/0x1b0 lib/dump_stack.c:106\n  print_address_description mm/kasan/report.c:377 [inline]\n  print_report+0xc4/0x620 mm/kasan/report.c:488\n  kasan_report+0xda/0x110 mm/kasan/report.c:601\n  list_empty include/linux/list.h:373 [inline]\n  waitqueue_active include/linux/wait.h:127 [inline]\n  sock_def_write_space_wfree net/core/sock.c:3384 [inline]\n  sock_wfree+0x9a8/0x9d0 net/core/sock.c:2468\n  skb_release_head_state+0xa3/0x2b0 net/core/skbuff.c:1080\n  skb_release_all net/core/skbuff.c:1092 [inline]\n  napi_consume_skb+0x119/0x2b0 net/core/skbuff.c:1404\n  e1000_unmap_and_free_tx_resource+0x144/0x200 drivers/net/ethernet/intel/e1000/e1000_main.c:1970\n  e1000_clean_tx_irq drivers/net/ethernet/intel/e1000/e1000_main.c:3860 [inline]\n  e1000_clean+0x4a1/0x26e0 drivers/net/ethernet/intel/e1000/e1000_main.c:3801\n  __napi_poll.constprop.0+0xb4/0x540 net/core/dev.c:6576\n  napi_poll net/core/dev.c:6645 [inline]\n  net_rx_action+0x956/0xe90 net/core/dev.c:6778\n  __do_softirq+0x21a/0x8de kernel/softirq.c:553\n  run_ksoftirqd kernel/softirq.c:921 [inline]\n  run_ksoftirqd+0x31/0x60 kernel/softirq.c:913\n  smpboot_thread_fn+0x660/0xa10 kernel/smpboot.c:164\n  kthread+0x2c6/0x3a0 kernel/kthread.c:388\n  ret_from_fork+0x45/0x80 arch/x86/kernel/process.c:147\n  ret_from_fork_asm+0x11/0x20 arch/x86/entry/entry_64.S:242\n \u003c/TASK\u003e\n\nAllocated by task 5167:\n  kasan_save_stack+0x33/0x50 mm/kasan/common.c:47\n  kasan_save_track+0x14/0x30 mm/kasan/common.c:68\n  unpoison_slab_object mm/kasan/common.c:314 [inline]\n  __kasan_slab_alloc+0x81/0x90 mm/kasan/common.c:340\n  kasan_slab_alloc include/linux/kasan.h:201 [inline]\n  slab_post_alloc_hook mm/slub.c:3813 [inline]\n  slab_alloc_node mm/slub.c:3860 [inline]\n  kmem_cache_alloc_lru+0x142/0x6f0 mm/slub.c:3879\n  alloc_inode_sb include/linux/fs.h:3019 [inline]\n  sock_alloc_inode+0x25/0x1c0 net/socket.c:308\n  alloc_inode+0x5d/0x220 fs/inode.c:260\n  new_inode_pseudo+0x16/0x80 fs/inode.c:1005\n  sock_alloc+0x40/0x270 net/socket.c:634\n  __sock_create+0xbc/0x800 net/socket.c:1535\n  sock_create net/socket.c:1622 [inline]\n  __sys_socket_create net/socket.c:1659 [inline]\n  __sys_socket+0x14c/0x260 net/socket.c:1706\n  __do_sys_socket net/socket.c:1720 [inline]\n  __se_sys_socket net/socket.c:1718 [inline]\n  __x64_sys_socket+0x72/0xb0 net/socket.c:1718\n  do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n  do_syscall_64+0xd3/0x250 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x63/0x6b\n\nFreed by task 0:\n  kasan_save_stack+0x33/0x50 mm/kasan/common.c:47\n  kasan_save_track+0x14/0x30 mm/kasan/common.c:68\n  kasan_save_free_info+0x3f/0x60 mm/kasan/generic.c:640\n  poison_slab_object mm/kasan/common.c:241 [inline]\n  __kasan_slab_free+0x121/0x1b0 mm/kasan/common.c:257\n  kasan_slab_free include/linux/kasan.h:184 [inline]\n  slab_free_hook mm/slub.c:2121 [inlin\n---truncated---",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26625",
          "url": "https://www.suse.com/security/cve/CVE-2024-26625"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1221086 for CVE-2024-26625",
          "url": "https://bugzilla.suse.com/1221086"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-24T18:34:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26625"
    },
    {
      "cve": "CVE-2024-26739",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26739"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/sched: act_mirred: don\u0027t override retval if we already lost the skb\n\nIf we\u0027re redirecting the skb, and haven\u0027t called tcf_mirred_forward(),\nyet, we need to tell the core to drop the skb by setting the retcode\nto SHOT. If we have called tcf_mirred_forward(), however, the skb\nis out of our hands and returning SHOT will lead to UaF.\n\nMove the retval override to the error path which actually need it.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26739",
          "url": "https://www.suse.com/security/cve/CVE-2024-26739"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222559 for CVE-2024-26739",
          "url": "https://bugzilla.suse.com/1222559"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-24T18:34:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26739"
    },
    {
      "cve": "CVE-2024-26752",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26752"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nl2tp: pass correct message length to ip6_append_data\n\nl2tp_ip6_sendmsg needs to avoid accounting for the transport header\ntwice when splicing more data into an already partially-occupied skbuff.\n\nTo manage this, we check whether the skbuff contains data using\nskb_queue_empty when deciding how much data to append using\nip6_append_data.\n\nHowever, the code which performed the calculation was incorrect:\n\n     ulen = len + skb_queue_empty(\u0026sk-\u003esk_write_queue) ? transhdrlen : 0;\n\n...due to C operator precedence, this ends up setting ulen to\ntranshdrlen for messages with a non-zero length, which results in\ncorrupted packets on the wire.\n\nAdd parentheses to correct the calculation in line with the original\nintent.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26752",
          "url": "https://www.suse.com/security/cve/CVE-2024-26752"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222667 for CVE-2024-26752",
          "url": "https://bugzilla.suse.com/1222667"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223292 for CVE-2024-26752",
          "url": "https://bugzilla.suse.com/1223292"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-24T18:34:20Z",
          "details": "important"
        }
      ],
      "title": "CVE-2024-26752"
    },
    {
      "cve": "CVE-2024-26775",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26775"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\naoe: avoid potential deadlock at set_capacity\n\nMove set_capacity() outside of the section procected by (\u0026d-\u003elock).\nTo avoid possible interrupt unsafe locking scenario:\n\n        CPU0                    CPU1\n        ----                    ----\n[1] lock(\u0026bdev-\u003ebd_size_lock);\n                                local_irq_disable();\n                            [2] lock(\u0026d-\u003elock);\n                            [3] lock(\u0026bdev-\u003ebd_size_lock);\n   \u003cInterrupt\u003e\n[4]  lock(\u0026d-\u003elock);\n\n  *** DEADLOCK ***\n\nWhere [1](\u0026bdev-\u003ebd_size_lock) hold by zram_add()-\u003eset_capacity().\n[2]lock(\u0026d-\u003elock) hold by aoeblk_gdalloc(). And aoeblk_gdalloc()\nis trying to acquire [3](\u0026bdev-\u003ebd_size_lock) at set_capacity() call.\nIn this situation an attempt to acquire [4]lock(\u0026d-\u003elock) from\naoecmd_cfg_rsp() will lead to deadlock.\n\nSo the simplest solution is breaking lock dependency\n[2](\u0026d-\u003elock) -\u003e [3](\u0026bdev-\u003ebd_size_lock) by moving set_capacity()\noutside.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26775",
          "url": "https://www.suse.com/security/cve/CVE-2024-26775"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222627 for CVE-2024-26775",
          "url": "https://bugzilla.suse.com/1222627"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-24T18:34:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26775"
    },
    {
      "cve": "CVE-2024-26791",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26791"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: dev-replace: properly validate device names\n\nThere\u0027s a syzbot report that device name buffers passed to device\nreplace are not properly checked for string termination which could lead\nto a read out of bounds in getname_kernel().\n\nAdd a helper that validates both source and target device name buffers.\nFor devid as the source initialize the buffer to empty string in case\nsomething tries to read it later.\n\nThis was originally analyzed and fixed in a different way by Edward Adam\nDavis (see links).",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26791",
          "url": "https://www.suse.com/security/cve/CVE-2024-26791"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222793 for CVE-2024-26791",
          "url": "https://bugzilla.suse.com/1222793"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-24T18:34:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26791"
    },
    {
      "cve": "CVE-2024-26828",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26828"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncifs: fix underflow in parse_server_interfaces()\n\nIn this loop, we step through the buffer and after each item we check\nif the size_left is greater than the minimum size we need.  However,\nthe problem is that \"bytes_left\" is type ssize_t while sizeof() is type\nsize_t.  That means that because of type promotion, the comparison is\ndone as an unsigned and if we have negative bytes left the loop\ncontinues instead of ending.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26828",
          "url": "https://www.suse.com/security/cve/CVE-2024-26828"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223084 for CVE-2024-26828",
          "url": "https://bugzilla.suse.com/1223084"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223363 for CVE-2024-26828",
          "url": "https://bugzilla.suse.com/1223363"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-24T18:34:20Z",
          "details": "important"
        }
      ],
      "title": "CVE-2024-26828"
    },
    {
      "cve": "CVE-2024-26846",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26846"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnvme-fc: do not wait in vain when unloading module\n\nThe module exit path has race between deleting all controllers and\nfreeing \u0027left over IDs\u0027. To prevent double free a synchronization\nbetween nvme_delete_ctrl and ida_destroy has been added by the initial\ncommit.\n\nThere is some logic around trying to prevent from hanging forever in\nwait_for_completion, though it does not handling all cases. E.g.\nblktests is able to reproduce the situation where the module unload\nhangs forever.\n\nIf we completely rely on the cleanup code executed from the\nnvme_delete_ctrl path, all IDs will be freed eventually. This makes\ncalling ida_destroy unnecessary. We only have to ensure that all\nnvme_delete_ctrl code has been executed before we leave\nnvme_fc_exit_module. This is done by flushing the nvme_delete_wq\nworkqueue.\n\nWhile at it, remove the unused nvme_fc_wq workqueue too.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26846",
          "url": "https://www.suse.com/security/cve/CVE-2024-26846"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223023 for CVE-2024-26846",
          "url": "https://bugzilla.suse.com/1223023"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-24T18:34:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26846"
    },
    {
      "cve": "CVE-2024-26874",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26874"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/mediatek: Fix a null pointer crash in mtk_drm_crtc_finish_page_flip\n\nIt\u0027s possible that mtk_crtc-\u003eevent is NULL in\nmtk_drm_crtc_finish_page_flip().\n\npending_needs_vblank value is set by mtk_crtc-\u003eevent, but in\nmtk_drm_crtc_atomic_flush(), it\u0027s is not guarded by the same\nlock in mtk_drm_finish_page_flip(), thus a race condition happens.\n\nConsider the following case:\n\nCPU1                              CPU2\nstep 1:\nmtk_drm_crtc_atomic_begin()\nmtk_crtc-\u003eevent is not null,\n                                  step 1:\n                                  mtk_drm_crtc_atomic_flush:\n                                  mtk_drm_crtc_update_config(\n                                      !!mtk_crtc-\u003eevent)\nstep 2:\nmtk_crtc_ddp_irq -\u003e\nmtk_drm_finish_page_flip:\nlock\nmtk_crtc-\u003eevent set to null,\npending_needs_vblank set to false\nunlock\n                                  pending_needs_vblank set to true,\n\n                                  step 2:\n                                  mtk_crtc_ddp_irq -\u003e\n                                  mtk_drm_finish_page_flip called again,\n                                  pending_needs_vblank is still true\n                                  //null pointer\n\nInstead of guarding the entire mtk_drm_crtc_atomic_flush(), it\u0027s more\nefficient to just check if mtk_crtc-\u003eevent is null before use.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26874",
          "url": "https://www.suse.com/security/cve/CVE-2024-26874"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223048 for CVE-2024-26874",
          "url": "https://bugzilla.suse.com/1223048"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-24T18:34:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26874"
    },
    {
      "cve": "CVE-2024-26876",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26876"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/bridge: adv7511: fix crash on irq during probe\n\nMoved IRQ registration down to end of adv7511_probe().\n\nIf an IRQ already is pending during adv7511_probe\n(before adv7511_cec_init) then cec_received_msg_ts\ncould crash using uninitialized data:\n\n    Unable to handle kernel read from unreadable memory at virtual address 00000000000003d5\n    Internal error: Oops: 96000004 [#1] PREEMPT_RT SMP\n    Call trace:\n     cec_received_msg_ts+0x48/0x990 [cec]\n     adv7511_cec_irq_process+0x1cc/0x308 [adv7511]\n     adv7511_irq_process+0xd8/0x120 [adv7511]\n     adv7511_irq_handler+0x1c/0x30 [adv7511]\n     irq_thread_fn+0x30/0xa0\n     irq_thread+0x14c/0x238\n     kthread+0x190/0x1a8",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26876",
          "url": "https://www.suse.com/security/cve/CVE-2024-26876"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223119 for CVE-2024-26876",
          "url": "https://bugzilla.suse.com/1223119"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-24T18:34:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26876"
    },
    {
      "cve": "CVE-2024-26900",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26900"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmd: fix kmemleak of rdev-\u003eserial\n\nIf kobject_add() is fail in bind_rdev_to_array(), \u0027rdev-\u003eserial\u0027 will be\nalloc not be freed, and kmemleak occurs.\n\nunreferenced object 0xffff88815a350000 (size 49152):\n  comm \"mdadm\", pid 789, jiffies 4294716910\n  hex dump (first 32 bytes):\n    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................\n    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................\n  backtrace (crc f773277a):\n    [\u003c0000000058b0a453\u003e] kmemleak_alloc+0x61/0xe0\n    [\u003c00000000366adf14\u003e] __kmalloc_large_node+0x15e/0x270\n    [\u003c000000002e82961b\u003e] __kmalloc_node.cold+0x11/0x7f\n    [\u003c00000000f206d60a\u003e] kvmalloc_node+0x74/0x150\n    [\u003c0000000034bf3363\u003e] rdev_init_serial+0x67/0x170\n    [\u003c0000000010e08fe9\u003e] mddev_create_serial_pool+0x62/0x220\n    [\u003c00000000c3837bf0\u003e] bind_rdev_to_array+0x2af/0x630\n    [\u003c0000000073c28560\u003e] md_add_new_disk+0x400/0x9f0\n    [\u003c00000000770e30ff\u003e] md_ioctl+0x15bf/0x1c10\n    [\u003c000000006cfab718\u003e] blkdev_ioctl+0x191/0x3f0\n    [\u003c0000000085086a11\u003e] vfs_ioctl+0x22/0x60\n    [\u003c0000000018b656fe\u003e] __x64_sys_ioctl+0xba/0xe0\n    [\u003c00000000e54e675e\u003e] do_syscall_64+0x71/0x150\n    [\u003c000000008b0ad622\u003e] entry_SYSCALL_64_after_hwframe+0x6c/0x74",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26900",
          "url": "https://www.suse.com/security/cve/CVE-2024-26900"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223046 for CVE-2024-26900",
          "url": "https://bugzilla.suse.com/1223046"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-24T18:34:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26900"
    },
    {
      "cve": "CVE-2024-26915",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26915"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amdgpu: Reset IH OVERFLOW_CLEAR bit\n\nAllows us to detect subsequent IH ring buffer overflows as well.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26915",
          "url": "https://www.suse.com/security/cve/CVE-2024-26915"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223207 for CVE-2024-26915",
          "url": "https://bugzilla.suse.com/1223207"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-24T18:34:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26915"
    },
    {
      "cve": "CVE-2024-26920",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26920"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntracing/trigger: Fix to return error if failed to alloc snapshot\n\nFix register_snapshot_trigger() to return error code if it failed to\nallocate a snapshot instead of 0 (success). Unless that, it will register\nsnapshot trigger without an error.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26920",
          "url": "https://www.suse.com/security/cve/CVE-2024-26920"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1228237 for CVE-2024-26920",
          "url": "https://bugzilla.suse.com/1228237"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-24T18:34:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26920"
    },
    {
      "cve": "CVE-2024-26921",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26921"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ninet: inet_defrag: prevent sk release while still in use\n\nip_local_out() and other functions can pass skb-\u003esk as function argument.\n\nIf the skb is a fragment and reassembly happens before such function call\nreturns, the sk must not be released.\n\nThis affects skb fragments reassembled via netfilter or similar\nmodules, e.g. openvswitch or ct_act.c, when run as part of tx pipeline.\n\nEric Dumazet made an initial analysis of this bug.  Quoting Eric:\n  Calling ip_defrag() in output path is also implying skb_orphan(),\n  which is buggy because output path relies on sk not disappearing.\n\n  A relevant old patch about the issue was :\n  8282f27449bf (\"inet: frag: Always orphan skbs inside ip_defrag()\")\n\n  [..]\n\n  net/ipv4/ip_output.c depends on skb-\u003esk being set, and probably to an\n  inet socket, not an arbitrary one.\n\n  If we orphan the packet in ipvlan, then downstream things like FQ\n  packet scheduler will not work properly.\n\n  We need to change ip_defrag() to only use skb_orphan() when really\n  needed, ie whenever frag_list is going to be used.\n\nEric suggested to stash sk in fragment queue and made an initial patch.\nHowever there is a problem with this:\n\nIf skb is refragmented again right after, ip_do_fragment() will copy\nhead-\u003esk to the new fragments, and sets up destructor to sock_wfree.\nIOW, we have no choice but to fix up sk_wmem accouting to reflect the\nfully reassembled skb, else wmem will underflow.\n\nThis change moves the orphan down into the core, to last possible moment.\nAs ip_defrag_offset is aliased with sk_buff-\u003esk member, we must move the\noffset into the FRAG_CB, else skb-\u003esk gets clobbered.\n\nThis allows to delay the orphaning long enough to learn if the skb has\nto be queued or if the skb is completing the reasm queue.\n\nIn the former case, things work as before, skb is orphaned.  This is\nsafe because skb gets queued/stolen and won\u0027t continue past reasm engine.\n\nIn the latter case, we will steal the skb-\u003esk reference, reattach it to\nthe head skb, and fix up wmem accouting when inet_frag inflates truesize.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26921",
          "url": "https://www.suse.com/security/cve/CVE-2024-26921"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223138 for CVE-2024-26921",
          "url": "https://bugzilla.suse.com/1223138"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223139 for CVE-2024-26921",
          "url": "https://bugzilla.suse.com/1223139"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.6,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-24T18:34:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26921"
    },
    {
      "cve": "CVE-2024-26929",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26929"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26929",
          "url": "https://www.suse.com/security/cve/CVE-2024-26929"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223715 for CVE-2024-26929",
          "url": "https://bugzilla.suse.com/1223715"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223716 for CVE-2024-26929",
          "url": "https://bugzilla.suse.com/1223716"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-24T18:34:20Z",
          "details": "important"
        }
      ],
      "title": "CVE-2024-26929"
    },
    {
      "cve": "CVE-2024-26930",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26930"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: qla2xxx: Fix double free of the ha-\u003evp_map pointer\n\nCoverity scan reported potential risk of double free of the pointer\nha-\u003evp_map.  ha-\u003evp_map was freed in qla2x00_mem_alloc(), and again freed\nin function qla2x00_mem_free(ha).\n\nAssign NULL to vp_map and kfree take care of NULL.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26930",
          "url": "https://www.suse.com/security/cve/CVE-2024-26930"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223626 for CVE-2024-26930",
          "url": "https://bugzilla.suse.com/1223626"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223681 for CVE-2024-26930",
          "url": "https://bugzilla.suse.com/1223681"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-24T18:34:20Z",
          "details": "important"
        }
      ],
      "title": "CVE-2024-26930"
    },
    {
      "cve": "CVE-2024-26931",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26931"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: qla2xxx: Fix command flush on cable pull\n\nSystem crash due to command failed to flush back to SCSI layer.\n\n BUG: unable to handle kernel NULL pointer dereference at 0000000000000000\n PGD 0 P4D 0\n Oops: 0000 [#1] SMP NOPTI\n CPU: 27 PID: 793455 Comm: kworker/u130:6 Kdump: loaded Tainted: G           OE    --------- -  - 4.18.0-372.9.1.el8.x86_64 #1\n Hardware name: HPE ProLiant DL360 Gen10/ProLiant DL360 Gen10, BIOS U32 09/03/2021\n Workqueue: nvme-wq nvme_fc_connect_ctrl_work [nvme_fc]\n RIP: 0010:__wake_up_common+0x4c/0x190\n Code: 24 10 4d 85 c9 74 0a 41 f6 01 04 0f 85 9d 00 00 00 48 8b 43 08 48 83 c3 08 4c 8d 48 e8 49 8d 41 18 48 39 c3 0f 84 f0 00 00 00 \u003c49\u003e 8b 41 18 89 54 24 08 31 ed 4c 8d 70 e8 45 8b 29 41 f6 c5 04 75\n RSP: 0018:ffff95f3e0cb7cd0 EFLAGS: 00010086\n RAX: 0000000000000000 RBX: ffff8b08d3b26328 RCX: 0000000000000000\n RDX: 0000000000000001 RSI: 0000000000000003 RDI: ffff8b08d3b26320\n RBP: 0000000000000001 R08: 0000000000000000 R09: ffffffffffffffe8\n R10: 0000000000000000 R11: ffff95f3e0cb7a60 R12: ffff95f3e0cb7d20\n R13: 0000000000000003 R14: 0000000000000000 R15: 0000000000000000\n FS:  0000000000000000(0000) GS:ffff8b2fdf6c0000(0000) knlGS:0000000000000000\n CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n CR2: 0000000000000000 CR3: 0000002f1e410002 CR4: 00000000007706e0\n DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\n PKRU: 55555554\n Call Trace:\n  __wake_up_common_lock+0x7c/0xc0\n  qla_nvme_ls_req+0x355/0x4c0 [qla2xxx]\n qla2xxx [0000:12:00.1]-f084:3: qlt_free_session_done: se_sess 0000000000000000 / sess ffff8ae1407ca000 from port 21:32:00:02:ac:07:ee:b8 loop_id 0x02 s_id 01:02:00 logout 1 keep 0 els_logo 0\n ? __nvme_fc_send_ls_req+0x260/0x380 [nvme_fc]\n qla2xxx [0000:12:00.1]-207d:3: FCPort 21:32:00:02:ac:07:ee:b8 state transitioned from ONLINE to LOST - portid=010200.\n  ? nvme_fc_send_ls_req.constprop.42+0x1a/0x45 [nvme_fc]\n qla2xxx [0000:12:00.1]-2109:3: qla2x00_schedule_rport_del 21320002ac07eeb8. rport ffff8ae598122000 roles 1\n ? nvme_fc_connect_ctrl_work.cold.63+0x1e3/0xa7d [nvme_fc]\n qla2xxx [0000:12:00.1]-f084:3: qlt_free_session_done: se_sess 0000000000000000 / sess ffff8ae14801e000 from port 21:32:01:02:ad:f7:ee:b8 loop_id 0x04 s_id 01:02:01 logout 1 keep 0 els_logo 0\n  ? __switch_to+0x10c/0x450\n ? process_one_work+0x1a7/0x360\n qla2xxx [0000:12:00.1]-207d:3: FCPort 21:32:01:02:ad:f7:ee:b8 state transitioned from ONLINE to LOST - portid=010201.\n  ? worker_thread+0x1ce/0x390\n  ? create_worker+0x1a0/0x1a0\n qla2xxx [0000:12:00.1]-2109:3: qla2x00_schedule_rport_del 21320102adf7eeb8. rport ffff8ae3b2312800 roles 70\n  ? kthread+0x10a/0x120\n qla2xxx [0000:12:00.1]-2112:3: qla_nvme_unregister_remote_port: unregister remoteport on ffff8ae14801e000 21320102adf7eeb8\n  ? set_kthread_struct+0x40/0x40\n qla2xxx [0000:12:00.1]-2110:3: remoteport_delete of ffff8ae14801e000 21320102adf7eeb8 completed.\n  ? ret_from_fork+0x1f/0x40\n qla2xxx [0000:12:00.1]-f086:3: qlt_free_session_done: waiting for sess ffff8ae14801e000 logout\n\nThe system was under memory stress where driver was not able to allocate an\nSRB to carry out error recovery of cable pull.  The failure to flush causes\nupper layer to start modifying scsi_cmnd.  When the system frees up some\nmemory, the subsequent cable pull trigger another command flush. At this\npoint the driver access a null pointer when attempting to DMA unmap the\nSGL.\n\nAdd a check to make sure commands are flush back on session tear down to\nprevent the null pointer access.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26931",
          "url": "https://www.suse.com/security/cve/CVE-2024-26931"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223627 for CVE-2024-26931",
          "url": "https://bugzilla.suse.com/1223627"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-24T18:34:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26931"
    },
    {
      "cve": "CVE-2024-26934",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26934"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nUSB: core: Fix deadlock in usb_deauthorize_interface()\n\nAmong the attribute file callback routines in\ndrivers/usb/core/sysfs.c, the interface_authorized_store() function is\nthe only one which acquires a device lock on an ancestor device: It\ncalls usb_deauthorize_interface(), which locks the interface\u0027s parent\nUSB device.\n\nThe will lead to deadlock if another process already owns that lock\nand tries to remove the interface, whether through a configuration\nchange or because the device has been disconnected.  As part of the\nremoval procedure, device_del() waits for all ongoing sysfs attribute\ncallbacks to complete.  But usb_deauthorize_interface() can\u0027t complete\nuntil the device lock has been released, and the lock won\u0027t be\nreleased until the removal has finished.\n\nThe mechanism provided by sysfs to prevent this kind of deadlock is\nto use the sysfs_break_active_protection() function, which tells sysfs\nnot to wait for the attribute callback.\n\nReported-and-tested by: Yue Sun \u003csamsun1006219@gmail.com\u003e\nReported by: xingwei lee \u003cxrivendell7@gmail.com\u003e",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26934",
          "url": "https://www.suse.com/security/cve/CVE-2024-26934"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223671 for CVE-2024-26934",
          "url": "https://bugzilla.suse.com/1223671"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-24T18:34:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26934"
    },
    {
      "cve": "CVE-2024-26957",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26957"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ns390/zcrypt: fix reference counting on zcrypt card objects\n\nTests with hot-plugging crytpo cards on KVM guests with debug\nkernel build revealed an use after free for the load field of\nthe struct zcrypt_card. The reason was an incorrect reference\nhandling of the zcrypt card object which could lead to a free\nof the zcrypt card object while it was still in use.\n\nThis is an example of the slab message:\n\n    kernel: 0x00000000885a7512-0x00000000885a7513 @offset=1298. First byte 0x68 instead of 0x6b\n    kernel: Allocated in zcrypt_card_alloc+0x36/0x70 [zcrypt] age=18046 cpu=3 pid=43\n    kernel:  kmalloc_trace+0x3f2/0x470\n    kernel:  zcrypt_card_alloc+0x36/0x70 [zcrypt]\n    kernel:  zcrypt_cex4_card_probe+0x26/0x380 [zcrypt_cex4]\n    kernel:  ap_device_probe+0x15c/0x290\n    kernel:  really_probe+0xd2/0x468\n    kernel:  driver_probe_device+0x40/0xf0\n    kernel:  __device_attach_driver+0xc0/0x140\n    kernel:  bus_for_each_drv+0x8c/0xd0\n    kernel:  __device_attach+0x114/0x198\n    kernel:  bus_probe_device+0xb4/0xc8\n    kernel:  device_add+0x4d2/0x6e0\n    kernel:  ap_scan_adapter+0x3d0/0x7c0\n    kernel:  ap_scan_bus+0x5a/0x3b0\n    kernel:  ap_scan_bus_wq_callback+0x40/0x60\n    kernel:  process_one_work+0x26e/0x620\n    kernel:  worker_thread+0x21c/0x440\n    kernel: Freed in zcrypt_card_put+0x54/0x80 [zcrypt] age=9024 cpu=3 pid=43\n    kernel:  kfree+0x37e/0x418\n    kernel:  zcrypt_card_put+0x54/0x80 [zcrypt]\n    kernel:  ap_device_remove+0x4c/0xe0\n    kernel:  device_release_driver_internal+0x1c4/0x270\n    kernel:  bus_remove_device+0x100/0x188\n    kernel:  device_del+0x164/0x3c0\n    kernel:  device_unregister+0x30/0x90\n    kernel:  ap_scan_adapter+0xc8/0x7c0\n    kernel:  ap_scan_bus+0x5a/0x3b0\n    kernel:  ap_scan_bus_wq_callback+0x40/0x60\n    kernel:  process_one_work+0x26e/0x620\n    kernel:  worker_thread+0x21c/0x440\n    kernel:  kthread+0x150/0x168\n    kernel:  __ret_from_fork+0x3c/0x58\n    kernel:  ret_from_fork+0xa/0x30\n    kernel: Slab 0x00000372022169c0 objects=20 used=18 fp=0x00000000885a7c88 flags=0x3ffff00000000a00(workingset|slab|node=0|zone=1|lastcpupid=0x1ffff)\n    kernel: Object 0x00000000885a74b8 @offset=1208 fp=0x00000000885a7c88\n    kernel: Redzone  00000000885a74b0: bb bb bb bb bb bb bb bb                          ........\n    kernel: Object   00000000885a74b8: 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b  kkkkkkkkkkkkkkkk\n    kernel: Object   00000000885a74c8: 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b  kkkkkkkkkkkkkkkk\n    kernel: Object   00000000885a74d8: 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b  kkkkkkkkkkkkkkkk\n    kernel: Object   00000000885a74e8: 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b  kkkkkkkkkkkkkkkk\n    kernel: Object   00000000885a74f8: 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b  kkkkkkkkkkkkkkkk\n    kernel: Object   00000000885a7508: 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 68 4b 6b 6b 6b a5  kkkkkkkkkkhKkkk.\n    kernel: Redzone  00000000885a7518: bb bb bb bb bb bb bb bb                          ........\n    kernel: Padding  00000000885a756c: 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a              ZZZZZZZZZZZZ\n    kernel: CPU: 0 PID: 387 Comm: systemd-udevd Not tainted 6.8.0-HF #2\n    kernel: Hardware name: IBM 3931 A01 704 (KVM/Linux)\n    kernel: Call Trace:\n    kernel:  [\u003c00000000ca5ab5b8\u003e] dump_stack_lvl+0x90/0x120\n    kernel:  [\u003c00000000c99d78bc\u003e] check_bytes_and_report+0x114/0x140\n    kernel:  [\u003c00000000c99d53cc\u003e] check_object+0x334/0x3f8\n    kernel:  [\u003c00000000c99d820c\u003e] alloc_debug_processing+0xc4/0x1f8\n    kernel:  [\u003c00000000c99d852e\u003e] get_partial_node.part.0+0x1ee/0x3e0\n    kernel:  [\u003c00000000c99d94ec\u003e] ___slab_alloc+0xaf4/0x13c8\n    kernel:  [\u003c00000000c99d9e38\u003e] __slab_alloc.constprop.0+0x78/0xb8\n    kernel:  [\u003c00000000c99dc8dc\u003e] __kmalloc+0x434/0x590\n    kernel:  [\u003c00000000c9b4c0ce\u003e] ext4_htree_store_dirent+0x4e/0x1c0\n    kernel:  [\u003c00000000c9b908a2\u003e] htree_dirblock_to_tree+0x17a/0x3f0\n    kernel: \n---truncated---",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26957",
          "url": "https://www.suse.com/security/cve/CVE-2024-26957"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223666 for CVE-2024-26957",
          "url": "https://bugzilla.suse.com/1223666"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-24T18:34:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26957"
    },
    {
      "cve": "CVE-2024-26958",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26958"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnfs: fix UAF in direct writes\n\nIn production we have been hitting the following warning consistently\n\n------------[ cut here ]------------\nrefcount_t: underflow; use-after-free.\nWARNING: CPU: 17 PID: 1800359 at lib/refcount.c:28 refcount_warn_saturate+0x9c/0xe0\nWorkqueue: nfsiod nfs_direct_write_schedule_work [nfs]\nRIP: 0010:refcount_warn_saturate+0x9c/0xe0\nPKRU: 55555554\nCall Trace:\n \u003cTASK\u003e\n ? __warn+0x9f/0x130\n ? refcount_warn_saturate+0x9c/0xe0\n ? report_bug+0xcc/0x150\n ? handle_bug+0x3d/0x70\n ? exc_invalid_op+0x16/0x40\n ? asm_exc_invalid_op+0x16/0x20\n ? refcount_warn_saturate+0x9c/0xe0\n nfs_direct_write_schedule_work+0x237/0x250 [nfs]\n process_one_work+0x12f/0x4a0\n worker_thread+0x14e/0x3b0\n ? ZSTD_getCParams_internal+0x220/0x220\n kthread+0xdc/0x120\n ? __btf_name_valid+0xa0/0xa0\n ret_from_fork+0x1f/0x30\n\nThis is because we\u0027re completing the nfs_direct_request twice in a row.\n\nThe source of this is when we have our commit requests to submit, we\nprocess them and send them off, and then in the completion path for the\ncommit requests we have\n\nif (nfs_commit_end(cinfo.mds))\n\tnfs_direct_write_complete(dreq);\n\nHowever since we\u0027re submitting asynchronous requests we sometimes have\none that completes before we submit the next one, so we end up calling\ncomplete on the nfs_direct_request twice.\n\nThe only other place we use nfs_generic_commit_list() is in\n__nfs_commit_inode, which wraps this call in a\n\nnfs_commit_begin();\nnfs_commit_end();\n\nWhich is a common pattern for this style of completion handling, one\nthat is also repeated in the direct code with get_dreq()/put_dreq()\ncalls around where we process events as well as in the completion paths.\n\nFix this by using the same pattern for the commit requests.\n\nBefore with my 200 node rocksdb stress running this warning would pop\nevery 10ish minutes.  With my patch the stress test has been running for\nseveral hours without popping.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26958",
          "url": "https://www.suse.com/security/cve/CVE-2024-26958"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223653 for CVE-2024-26958",
          "url": "https://bugzilla.suse.com/1223653"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-24T18:34:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26958"
    },
    {
      "cve": "CVE-2024-26984",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26984"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnouveau: fix instmem race condition around ptr stores\n\nRunning a lot of VK CTS in parallel against nouveau, once every\nfew hours you might see something like this crash.\n\nBUG: kernel NULL pointer dereference, address: 0000000000000008\nPGD 8000000114e6e067 P4D 8000000114e6e067 PUD 109046067 PMD 0\nOops: 0000 [#1] PREEMPT SMP PTI\nCPU: 7 PID: 53891 Comm: deqp-vk Not tainted 6.8.0-rc6+ #27\nHardware name: Gigabyte Technology Co., Ltd. Z390 I AORUS PRO WIFI/Z390 I AORUS PRO WIFI-CF, BIOS F8 11/05/2021\nRIP: 0010:gp100_vmm_pgt_mem+0xe3/0x180 [nouveau]\nCode: c7 48 01 c8 49 89 45 58 85 d2 0f 84 95 00 00 00 41 0f b7 46 12 49 8b 7e 08 89 da 42 8d 2c f8 48 8b 47 08 41 83 c7 01 48 89 ee \u003c48\u003e 8b 40 08 ff d0 0f 1f 00 49 8b 7e 08 48 89 d9 48 8d 75 04 48 c1\nRSP: 0000:ffffac20c5857838 EFLAGS: 00010202\nRAX: 0000000000000000 RBX: 00000000004d8001 RCX: 0000000000000001\nRDX: 00000000004d8001 RSI: 00000000000006d8 RDI: ffffa07afe332180\nRBP: 00000000000006d8 R08: ffffac20c5857ad0 R09: 0000000000ffff10\nR10: 0000000000000001 R11: ffffa07af27e2de0 R12: 000000000000001c\nR13: ffffac20c5857ad0 R14: ffffa07a96fe9040 R15: 000000000000001c\nFS:  00007fe395eed7c0(0000) GS:ffffa07e2c980000(0000) knlGS:0000000000000000\nCS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 0000000000000008 CR3: 000000011febe001 CR4: 00000000003706f0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\nCall Trace:\n\n...\n\n ? gp100_vmm_pgt_mem+0xe3/0x180 [nouveau]\n ? gp100_vmm_pgt_mem+0x37/0x180 [nouveau]\n nvkm_vmm_iter+0x351/0xa20 [nouveau]\n ? __pfx_nvkm_vmm_ref_ptes+0x10/0x10 [nouveau]\n ? __pfx_gp100_vmm_pgt_mem+0x10/0x10 [nouveau]\n ? __pfx_gp100_vmm_pgt_mem+0x10/0x10 [nouveau]\n ? __lock_acquire+0x3ed/0x2170\n ? __pfx_gp100_vmm_pgt_mem+0x10/0x10 [nouveau]\n nvkm_vmm_ptes_get_map+0xc2/0x100 [nouveau]\n ? __pfx_nvkm_vmm_ref_ptes+0x10/0x10 [nouveau]\n ? __pfx_gp100_vmm_pgt_mem+0x10/0x10 [nouveau]\n nvkm_vmm_map_locked+0x224/0x3a0 [nouveau]\n\nAdding any sort of useful debug usually makes it go away, so I hand\nwrote the function in a line, and debugged the asm.\n\nEvery so often pt-\u003ememory-\u003eptrs is NULL. This ptrs ptr is set in\nthe nv50_instobj_acquire called from nvkm_kmap.\n\nIf Thread A and Thread B both get to nv50_instobj_acquire around\nthe same time, and Thread A hits the refcount_set line, and in\nlockstep thread B succeeds at refcount_inc_not_zero, there is a\nchance the ptrs value won\u0027t have been stored since refcount_set\nis unordered. Force a memory barrier here, I picked smp_mb, since\nwe want it on all CPUs and it\u0027s write followed by a read.\n\nv2: use paired smp_rmb/smp_wmb.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26984",
          "url": "https://www.suse.com/security/cve/CVE-2024-26984"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223633 for CVE-2024-26984",
          "url": "https://bugzilla.suse.com/1223633"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-24T18:34:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26984"
    },
    {
      "cve": "CVE-2024-26996",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26996"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: gadget: f_ncm: Fix UAF ncm object at re-bind after usb ep transport error\n\nWhen ncm function is working and then stop usb0 interface for link down,\neth_stop() is called. At this piont, accidentally if usb transport error\nshould happen in usb_ep_enable(), \u0027in_ep\u0027 and/or \u0027out_ep\u0027 may not be enabled.\n\nAfter that, ncm_disable() is called to disable for ncm unbind\nbut gether_disconnect() is never called since \u0027in_ep\u0027 is not enabled.\n\nAs the result, ncm object is released in ncm unbind\nbut \u0027dev-\u003eport_usb\u0027 associated to \u0027ncm-\u003eport\u0027 is not NULL.\n\nAnd when ncm bind again to recover netdev, ncm object is reallocated\nbut usb0 interface is already associated to previous released ncm object.\n\nTherefore, once usb0 interface is up and eth_start_xmit() is called,\nreleased ncm object is dereferrenced and it might cause use-after-free memory.\n\n[function unlink via configfs]\n  usb0: eth_stop dev-\u003eport_usb=ffffff9b179c3200\n  --\u003e error happens in usb_ep_enable().\n  NCM: ncm_disable: ncm=ffffff9b179c3200\n  --\u003e no gether_disconnect() since ncm-\u003eport.in_ep-\u003eenabled is false.\n  NCM: ncm_unbind: ncm unbind ncm=ffffff9b179c3200\n  NCM: ncm_free: ncm free ncm=ffffff9b179c3200   \u003c-- released ncm\n\n[function link via configfs]\n  NCM: ncm_alloc: ncm alloc ncm=ffffff9ac4f8a000\n  NCM: ncm_bind: ncm bind ncm=ffffff9ac4f8a000\n  NCM: ncm_set_alt: ncm=ffffff9ac4f8a000 alt=0\n  usb0: eth_open dev-\u003eport_usb=ffffff9b179c3200  \u003c-- previous released ncm\n  usb0: eth_start dev-\u003eport_usb=ffffff9b179c3200 \u003c--\n  eth_start_xmit()\n  --\u003e dev-\u003ewrap()\n  Unable to handle kernel paging request at virtual address dead00000000014f\n\nThis patch addresses the issue by checking if \u0027ncm-\u003enetdev\u0027 is not NULL at\nncm_disable() to call gether_disconnect() to deassociate \u0027dev-\u003eport_usb\u0027.\nIt\u0027s more reasonable to check \u0027ncm-\u003enetdev\u0027 to call gether_connect/disconnect\nrather than check \u0027ncm-\u003eport.in_ep-\u003eenabled\u0027 since it might not be enabled\nbut the gether connection might be established.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26996",
          "url": "https://www.suse.com/security/cve/CVE-2024-26996"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223752 for CVE-2024-26996",
          "url": "https://bugzilla.suse.com/1223752"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-24T18:34:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26996"
    },
    {
      "cve": "CVE-2024-27008",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-27008"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm: nv04: Fix out of bounds access\n\nWhen Output Resource (dcb-\u003eor) value is assigned in\nfabricate_dcb_output(), there may be out of bounds access to\ndac_users array in case dcb-\u003eor is zero because ffs(dcb-\u003eor) is\nused as index there.\nThe \u0027or\u0027 argument of fabricate_dcb_output() must be interpreted as a\nnumber of bit to set, not value.\n\nUtilize macros from \u0027enum nouveau_or\u0027 in calls instead of hardcoding.\n\nFound by Linux Verification Center (linuxtesting.org) with SVACE.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-27008",
          "url": "https://www.suse.com/security/cve/CVE-2024-27008"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223802 for CVE-2024-27008",
          "url": "https://bugzilla.suse.com/1223802"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-24T18:34:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-27008"
    },
    {
      "cve": "CVE-2024-27054",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-27054"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ns390/dasd: fix double module refcount decrement\n\nOnce the discipline is associated with the device, deleting the device\ntakes care of decrementing the module\u0027s refcount.  Doing it manually on\nthis error path causes refcount to artificially decrease on each error\nwhile it should just stay the same.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-27054",
          "url": "https://www.suse.com/security/cve/CVE-2024-27054"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223819 for CVE-2024-27054",
          "url": "https://bugzilla.suse.com/1223819"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-24T18:34:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-27054"
    },
    {
      "cve": "CVE-2024-27059",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-27059"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nUSB: usb-storage: Prevent divide-by-0 error in isd200_ata_command\n\nThe isd200 sub-driver in usb-storage uses the HEADS and SECTORS values\nin the ATA ID information to calculate cylinder and head values when\ncreating a CDB for READ or WRITE commands.  The calculation involves\ndivision and modulus operations, which will cause a crash if either of\nthese values is 0.  While this never happens with a genuine device, it\ncould happen with a flawed or subversive emulation, as reported by the\nsyzbot fuzzer.\n\nProtect against this possibility by refusing to bind to the device if\neither the ATA_ID_HEADS or ATA_ID_SECTORS value in the device\u0027s ID\ninformation is 0.  This requires isd200_Initialization() to return a\nnegative error code when initialization fails; currently it always\nreturns 0 (even when there is an error).",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-27059",
          "url": "https://www.suse.com/security/cve/CVE-2024-27059"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223738 for CVE-2024-27059",
          "url": "https://bugzilla.suse.com/1223738"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-24T18:34:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-27059"
    },
    {
      "cve": "CVE-2024-27062",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-27062"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnouveau: lock the client object tree.\n\nIt appears the client object tree has no locking unless I\u0027ve missed\nsomething else. Fix races around adding/removing client objects,\nmostly vram bar mappings.\n\n 4562.099306] general protection fault, probably for non-canonical address 0x6677ed422bceb80c: 0000 [#1] PREEMPT SMP PTI\n[ 4562.099314] CPU: 2 PID: 23171 Comm: deqp-vk Not tainted 6.8.0-rc6+ #27\n[ 4562.099324] Hardware name: Gigabyte Technology Co., Ltd. Z390 I AORUS PRO WIFI/Z390 I AORUS PRO WIFI-CF, BIOS F8 11/05/2021\n[ 4562.099330] RIP: 0010:nvkm_object_search+0x1d/0x70 [nouveau]\n[ 4562.099503] Code: 90 90 90 90 90 90 90 90 90 90 90 90 90 66 0f 1f 00 0f 1f 44 00 00 48 89 f8 48 85 f6 74 39 48 8b 87 a0 00 00 00 48 85 c0 74 12 \u003c48\u003e 8b 48 f8 48 39 ce 73 15 48 8b 40 10 48 85 c0 75 ee 48 c7 c0 fe\n[ 4562.099506] RSP: 0000:ffffa94cc420bbf8 EFLAGS: 00010206\n[ 4562.099512] RAX: 6677ed422bceb814 RBX: ffff98108791f400 RCX: ffff9810f26b8f58\n[ 4562.099517] RDX: 0000000000000000 RSI: ffff9810f26b9158 RDI: ffff98108791f400\n[ 4562.099519] RBP: ffff9810f26b9158 R08: 0000000000000000 R09: 0000000000000000\n[ 4562.099521] R10: ffffa94cc420bc48 R11: 0000000000000001 R12: ffff9810f02a7cc0\n[ 4562.099526] R13: 0000000000000000 R14: 00000000000000ff R15: 0000000000000007\n[ 4562.099528] FS:  00007f629c5017c0(0000) GS:ffff98142c700000(0000) knlGS:0000000000000000\n[ 4562.099534] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[ 4562.099536] CR2: 00007f629a882000 CR3: 000000017019e004 CR4: 00000000003706f0\n[ 4562.099541] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n[ 4562.099542] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\n[ 4562.099544] Call Trace:\n[ 4562.099555]  \u003cTASK\u003e\n[ 4562.099573]  ? die_addr+0x36/0x90\n[ 4562.099583]  ? exc_general_protection+0x246/0x4a0\n[ 4562.099593]  ? asm_exc_general_protection+0x26/0x30\n[ 4562.099600]  ? nvkm_object_search+0x1d/0x70 [nouveau]\n[ 4562.099730]  nvkm_ioctl+0xa1/0x250 [nouveau]\n[ 4562.099861]  nvif_object_map_handle+0xc8/0x180 [nouveau]\n[ 4562.099986]  nouveau_ttm_io_mem_reserve+0x122/0x270 [nouveau]\n[ 4562.100156]  ? dma_resv_test_signaled+0x26/0xb0\n[ 4562.100163]  ttm_bo_vm_fault_reserved+0x97/0x3c0 [ttm]\n[ 4562.100182]  ? __mutex_unlock_slowpath+0x2a/0x270\n[ 4562.100189]  nouveau_ttm_fault+0x69/0xb0 [nouveau]\n[ 4562.100356]  __do_fault+0x32/0x150\n[ 4562.100362]  do_fault+0x7c/0x560\n[ 4562.100369]  __handle_mm_fault+0x800/0xc10\n[ 4562.100382]  handle_mm_fault+0x17c/0x3e0\n[ 4562.100388]  do_user_addr_fault+0x208/0x860\n[ 4562.100395]  exc_page_fault+0x7f/0x200\n[ 4562.100402]  asm_exc_page_fault+0x26/0x30\n[ 4562.100412] RIP: 0033:0x9b9870\n[ 4562.100419] Code: 85 a8 f7 ff ff 8b 8d 80 f7 ff ff 89 08 e9 18 f2 ff ff 0f 1f 84 00 00 00 00 00 44 89 32 e9 90 fa ff ff 0f 1f 84 00 00 00 00 00 \u003c44\u003e 89 32 e9 f8 f1 ff ff 0f 1f 84 00 00 00 00 00 66 44 89 32 e9 e7\n[ 4562.100422] RSP: 002b:00007fff9ba2dc70 EFLAGS: 00010246\n[ 4562.100426] RAX: 0000000000000004 RBX: 000000000dd65e10 RCX: 000000fff0000000\n[ 4562.100428] RDX: 00007f629a882000 RSI: 00007f629a882000 RDI: 0000000000000066\n[ 4562.100432] RBP: 00007fff9ba2e570 R08: 0000000000000000 R09: 0000000123ddf000\n[ 4562.100434] R10: 0000000000000001 R11: 0000000000000246 R12: 000000007fffffff\n[ 4562.100436] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000\n[ 4562.100446]  \u003c/TASK\u003e\n[ 4562.100448] Modules linked in: nf_conntrack_netbios_ns nf_conntrack_broadcast nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib nft_reject_inet nf_reject_ipv4 nf_reject_ipv6 nft_reject nft_ct nft_chain_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 ip_set nf_tables libcrc32c nfnetlink cmac bnep sunrpc iwlmvm intel_rapl_msr intel_rapl_common snd_sof_pci_intel_cnl x86_pkg_temp_thermal intel_powerclamp snd_sof_intel_hda_common mac80211 coretemp snd_soc_acpi_intel_match kvm_intel snd_soc_acpi snd_soc_hdac_hda snd_sof_pci snd_sof_xtensa_dsp snd_sof_intel_hda_mlink \n---truncated---",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-27062",
          "url": "https://www.suse.com/security/cve/CVE-2024-27062"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223834 for CVE-2024-27062",
          "url": "https://bugzilla.suse.com/1223834"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-24T18:34:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-27062"
    },
    {
      "cve": "CVE-2024-27388",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-27388"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nSUNRPC: fix some memleaks in gssx_dec_option_array\n\nThe creds and oa-\u003edata need to be freed in the error-handling paths after\ntheir allocation. So this patch add these deallocations in the\ncorresponding paths.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-27388",
          "url": "https://www.suse.com/security/cve/CVE-2024-27388"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223744 for CVE-2024-27388",
          "url": "https://bugzilla.suse.com/1223744"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-24T18:34:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-27388"
    },
    {
      "cve": "CVE-2024-27396",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-27396"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: gtp: Fix Use-After-Free in gtp_dellink\n\nSince call_rcu, which is called in the hlist_for_each_entry_rcu traversal\nof gtp_dellink, is not part of the RCU read critical section, it\nis possible that the RCU grace period will pass during the traversal and\nthe key will be free.\n\nTo prevent this, it should be changed to hlist_for_each_entry_safe.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-27396",
          "url": "https://www.suse.com/security/cve/CVE-2024-27396"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1224096 for CVE-2024-27396",
          "url": "https://bugzilla.suse.com/1224096"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-24T18:34:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-27396"
    },
    {
      "cve": "CVE-2024-27398",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-27398"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: Fix use-after-free bugs caused by sco_sock_timeout\n\nWhen the sco connection is established and then, the sco socket\nis releasing, timeout_work will be scheduled to judge whether\nthe sco disconnection is timeout. The sock will be deallocated\nlater, but it is dereferenced again in sco_sock_timeout. As a\nresult, the use-after-free bugs will happen. The root cause is\nshown below:\n\n    Cleanup Thread               |      Worker Thread\nsco_sock_release                 |\n  sco_sock_close                 |\n    __sco_sock_close             |\n      sco_sock_set_timer         |\n        schedule_delayed_work    |\n  sco_sock_kill                  |    (wait a time)\n    sock_put(sk) //FREE          |  sco_sock_timeout\n                                 |    sock_hold(sk) //USE\n\nThe KASAN report triggered by POC is shown below:\n\n[   95.890016] ==================================================================\n[   95.890496] BUG: KASAN: slab-use-after-free in sco_sock_timeout+0x5e/0x1c0\n[   95.890755] Write of size 4 at addr ffff88800c388080 by task kworker/0:0/7\n...\n[   95.890755] Workqueue: events sco_sock_timeout\n[   95.890755] Call Trace:\n[   95.890755]  \u003cTASK\u003e\n[   95.890755]  dump_stack_lvl+0x45/0x110\n[   95.890755]  print_address_description+0x78/0x390\n[   95.890755]  print_report+0x11b/0x250\n[   95.890755]  ? __virt_addr_valid+0xbe/0xf0\n[   95.890755]  ? sco_sock_timeout+0x5e/0x1c0\n[   95.890755]  kasan_report+0x139/0x170\n[   95.890755]  ? update_load_avg+0xe5/0x9f0\n[   95.890755]  ? sco_sock_timeout+0x5e/0x1c0\n[   95.890755]  kasan_check_range+0x2c3/0x2e0\n[   95.890755]  sco_sock_timeout+0x5e/0x1c0\n[   95.890755]  process_one_work+0x561/0xc50\n[   95.890755]  worker_thread+0xab2/0x13c0\n[   95.890755]  ? pr_cont_work+0x490/0x490\n[   95.890755]  kthread+0x279/0x300\n[   95.890755]  ? pr_cont_work+0x490/0x490\n[   95.890755]  ? kthread_blkcg+0xa0/0xa0\n[   95.890755]  ret_from_fork+0x34/0x60\n[   95.890755]  ? kthread_blkcg+0xa0/0xa0\n[   95.890755]  ret_from_fork_asm+0x11/0x20\n[   95.890755]  \u003c/TASK\u003e\n[   95.890755]\n[   95.890755] Allocated by task 506:\n[   95.890755]  kasan_save_track+0x3f/0x70\n[   95.890755]  __kasan_kmalloc+0x86/0x90\n[   95.890755]  __kmalloc+0x17f/0x360\n[   95.890755]  sk_prot_alloc+0xe1/0x1a0\n[   95.890755]  sk_alloc+0x31/0x4e0\n[   95.890755]  bt_sock_alloc+0x2b/0x2a0\n[   95.890755]  sco_sock_create+0xad/0x320\n[   95.890755]  bt_sock_create+0x145/0x320\n[   95.890755]  __sock_create+0x2e1/0x650\n[   95.890755]  __sys_socket+0xd0/0x280\n[   95.890755]  __x64_sys_socket+0x75/0x80\n[   95.890755]  do_syscall_64+0xc4/0x1b0\n[   95.890755]  entry_SYSCALL_64_after_hwframe+0x67/0x6f\n[   95.890755]\n[   95.890755] Freed by task 506:\n[   95.890755]  kasan_save_track+0x3f/0x70\n[   95.890755]  kasan_save_free_info+0x40/0x50\n[   95.890755]  poison_slab_object+0x118/0x180\n[   95.890755]  __kasan_slab_free+0x12/0x30\n[   95.890755]  kfree+0xb2/0x240\n[   95.890755]  __sk_destruct+0x317/0x410\n[   95.890755]  sco_sock_release+0x232/0x280\n[   95.890755]  sock_close+0xb2/0x210\n[   95.890755]  __fput+0x37f/0x770\n[   95.890755]  task_work_run+0x1ae/0x210\n[   95.890755]  get_signal+0xe17/0xf70\n[   95.890755]  arch_do_signal_or_restart+0x3f/0x520\n[   95.890755]  syscall_exit_to_user_mode+0x55/0x120\n[   95.890755]  do_syscall_64+0xd1/0x1b0\n[   95.890755]  entry_SYSCALL_64_after_hwframe+0x67/0x6f\n[   95.890755]\n[   95.890755] The buggy address belongs to the object at ffff88800c388000\n[   95.890755]  which belongs to the cache kmalloc-1k of size 1024\n[   95.890755] The buggy address is located 128 bytes inside of\n[   95.890755]  freed 1024-byte region [ffff88800c388000, ffff88800c388400)\n[   95.890755]\n[   95.890755] The buggy address belongs to the physical page:\n[   95.890755] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0xffff88800c38a800 pfn:0xc388\n[   95.890755] head: order:3 entire_mapcount:0 nr_pages_mapped:0 pincount:0\n[   95.890755] ano\n---truncated---",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-27398",
          "url": "https://www.suse.com/security/cve/CVE-2024-27398"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1224174 for CVE-2024-27398",
          "url": "https://bugzilla.suse.com/1224174"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1225013 for CVE-2024-27398",
          "url": "https://bugzilla.suse.com/1225013"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-24T18:34:20Z",
          "details": "important"
        }
      ],
      "title": "CVE-2024-27398"
    },
    {
      "cve": "CVE-2024-27401",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-27401"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfirewire: nosy: ensure user_length is taken into account when fetching packet contents\n\nEnsure that packet_buffer_get respects the user_length provided. If\nthe length of the head packet exceeds the user_length, packet_buffer_get\nwill now return 0 to signify to the user that no data were read\nand a larger buffer size is required. Helps prevent user space overflows.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-27401",
          "url": "https://www.suse.com/security/cve/CVE-2024-27401"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1224181 for CVE-2024-27401",
          "url": "https://bugzilla.suse.com/1224181"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.6,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-24T18:34:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-27401"
    },
    {
      "cve": "CVE-2024-27419",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-27419"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetrom: Fix data-races around sysctl_net_busy_read\n\nWe need to protect the reader reading the sysctl value because the\nvalue can be changed concurrently.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-27419",
          "url": "https://www.suse.com/security/cve/CVE-2024-27419"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1224759 for CVE-2024-27419",
          "url": "https://bugzilla.suse.com/1224759"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 2.5,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-24T18:34:20Z",
          "details": "low"
        }
      ],
      "title": "CVE-2024-27419"
    },
    {
      "cve": "CVE-2024-27436",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-27436"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: usb-audio: Stop parsing channels bits when all channels are found.\n\nIf a usb audio device sets more bits than the amount of channels\nit could write outside of the map array.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-27436",
          "url": "https://www.suse.com/security/cve/CVE-2024-27436"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1224803 for CVE-2024-27436",
          "url": "https://bugzilla.suse.com/1224803"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-24T18:34:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-27436"
    },
    {
      "cve": "CVE-2024-35789",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-35789"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: mac80211: check/clear fast rx for non-4addr sta VLAN changes\n\nWhen moving a station out of a VLAN and deleting the VLAN afterwards, the\nfast_rx entry still holds a pointer to the VLAN\u0027s netdev, which can cause\nuse-after-free bugs. Fix this by immediately calling ieee80211_check_fast_rx\nafter the VLAN change.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-35789",
          "url": "https://www.suse.com/security/cve/CVE-2024-35789"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1224749 for CVE-2024-35789",
          "url": "https://bugzilla.suse.com/1224749"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1227320 for CVE-2024-35789",
          "url": "https://bugzilla.suse.com/1227320"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-24T18:34:20Z",
          "details": "important"
        }
      ],
      "title": "CVE-2024-35789"
    },
    {
      "cve": "CVE-2024-35791",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-35791"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nKVM: SVM: Flush pages under kvm-\u003elock to fix UAF in svm_register_enc_region()\n\nDo the cache flush of converted pages in svm_register_enc_region() before\ndropping kvm-\u003elock to fix use-after-free issues where region and/or its\narray of pages could be freed by a different task, e.g. if userspace has\n__unregister_enc_region_locked() already queued up for the region.\n\nNote, the \"obvious\" alternative of using local variables doesn\u0027t fully\nresolve the bug, as region-\u003epages is also dynamically allocated.  I.e. the\nregion structure itself would be fine, but region-\u003epages could be freed.\n\nFlushing multiple pages under kvm-\u003elock is unfortunate, but the entire\nflow is a rare slow path, and the manual flush is only needed on CPUs that\nlack coherency for encrypted memory.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-35791",
          "url": "https://www.suse.com/security/cve/CVE-2024-35791"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1224725 for CVE-2024-35791",
          "url": "https://bugzilla.suse.com/1224725"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-24T18:34:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-35791"
    },
    {
      "cve": "CVE-2024-35809",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-35809"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nPCI/PM: Drain runtime-idle callbacks before driver removal\n\nA race condition between the .runtime_idle() callback and the .remove()\ncallback in the rtsx_pcr PCI driver leads to a kernel crash due to an\nunhandled page fault [1].\n\nThe problem is that rtsx_pci_runtime_idle() is not expected to be running\nafter pm_runtime_get_sync() has been called, but the latter doesn\u0027t really\nguarantee that.  It only guarantees that the suspend and resume callbacks\nwill not be running when it returns.\n\nHowever, if a .runtime_idle() callback is already running when\npm_runtime_get_sync() is called, the latter will notice that the runtime PM\nstatus of the device is RPM_ACTIVE and it will return right away without\nwaiting for the former to complete.  In fact, it cannot wait for\n.runtime_idle() to complete because it may be called from that callback (it\narguably does not make much sense to do that, but it is not strictly\nprohibited).\n\nThus in general, whoever is providing a .runtime_idle() callback needs\nto protect it from running in parallel with whatever code runs after\npm_runtime_get_sync().  [Note that .runtime_idle() will not start after\npm_runtime_get_sync() has returned, but it may continue running then if it\nhas started earlier.]\n\nOne way to address that race condition is to call pm_runtime_barrier()\nafter pm_runtime_get_sync() (not before it, because a nonzero value of the\nruntime PM usage counter is necessary to prevent runtime PM callbacks from\nbeing invoked) to wait for the .runtime_idle() callback to complete should\nit be running at that point.  A suitable place for doing that is in\npci_device_remove() which calls pm_runtime_get_sync() before removing the\ndriver, so it may as well call pm_runtime_barrier() subsequently, which\nwill prevent the race in question from occurring, not just in the rtsx_pcr\ndriver, but in any PCI drivers providing .runtime_idle() callbacks.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-35809",
          "url": "https://www.suse.com/security/cve/CVE-2024-35809"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1224738 for CVE-2024-35809",
          "url": "https://bugzilla.suse.com/1224738"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-24T18:34:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-35809"
    },
    {
      "cve": "CVE-2024-35811",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-35811"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: brcmfmac: Fix use-after-free bug in brcmf_cfg80211_detach\n\nThis is the candidate patch of CVE-2023-47233 :\nhttps://nvd.nist.gov/vuln/detail/CVE-2023-47233\n\nIn brcm80211 driver,it starts with the following invoking chain\nto start init a timeout worker:\n\n-\u003ebrcmf_usb_probe\n  -\u003ebrcmf_usb_probe_cb\n    -\u003ebrcmf_attach\n      -\u003ebrcmf_bus_started\n        -\u003ebrcmf_cfg80211_attach\n          -\u003ewl_init_priv\n            -\u003ebrcmf_init_escan\n              -\u003eINIT_WORK(\u0026cfg-\u003eescan_timeout_work,\n\t\t  brcmf_cfg80211_escan_timeout_worker);\n\nIf we disconnect the USB by hotplug, it will call\nbrcmf_usb_disconnect to make cleanup. The invoking chain is :\n\nbrcmf_usb_disconnect\n  -\u003ebrcmf_usb_disconnect_cb\n    -\u003ebrcmf_detach\n      -\u003ebrcmf_cfg80211_detach\n        -\u003ekfree(cfg);\n\nWhile the timeout woker may still be running. This will cause\na use-after-free bug on cfg in brcmf_cfg80211_escan_timeout_worker.\n\nFix it by deleting the timer and canceling the worker in\nbrcmf_cfg80211_detach.\n\n[arend.vanspriel@broadcom.com: keep timer delete as is and cancel work just before free]",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-35811",
          "url": "https://www.suse.com/security/cve/CVE-2024-35811"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1224592 for CVE-2024-35811",
          "url": "https://bugzilla.suse.com/1224592"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-24T18:34:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-35811"
    },
    {
      "cve": "CVE-2024-35830",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-35830"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: tc358743: register v4l2 async device only after successful setup\n\nEnsure the device has been setup correctly before registering the v4l2\nasync device, thus allowing userspace to access.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-35830",
          "url": "https://www.suse.com/security/cve/CVE-2024-35830"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1224680 for CVE-2024-35830",
          "url": "https://bugzilla.suse.com/1224680"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-24T18:34:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-35830"
    },
    {
      "cve": "CVE-2024-35849",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-35849"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: fix information leak in btrfs_ioctl_logical_to_ino()\n\nSyzbot reported the following information leak for in\nbtrfs_ioctl_logical_to_ino():\n\n  BUG: KMSAN: kernel-infoleak in instrument_copy_to_user include/linux/instrumented.h:114 [inline]\n  BUG: KMSAN: kernel-infoleak in _copy_to_user+0xbc/0x110 lib/usercopy.c:40\n   instrument_copy_to_user include/linux/instrumented.h:114 [inline]\n   _copy_to_user+0xbc/0x110 lib/usercopy.c:40\n   copy_to_user include/linux/uaccess.h:191 [inline]\n   btrfs_ioctl_logical_to_ino+0x440/0x750 fs/btrfs/ioctl.c:3499\n   btrfs_ioctl+0x714/0x1260\n   vfs_ioctl fs/ioctl.c:51 [inline]\n   __do_sys_ioctl fs/ioctl.c:904 [inline]\n   __se_sys_ioctl+0x261/0x450 fs/ioctl.c:890\n   __x64_sys_ioctl+0x96/0xe0 fs/ioctl.c:890\n   x64_sys_call+0x1883/0x3b50 arch/x86/include/generated/asm/syscalls_64.h:17\n   do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n   do_syscall_64+0xcf/0x1e0 arch/x86/entry/common.c:83\n   entry_SYSCALL_64_after_hwframe+0x77/0x7f\n\n  Uninit was created at:\n   __kmalloc_large_node+0x231/0x370 mm/slub.c:3921\n   __do_kmalloc_node mm/slub.c:3954 [inline]\n   __kmalloc_node+0xb07/0x1060 mm/slub.c:3973\n   kmalloc_node include/linux/slab.h:648 [inline]\n   kvmalloc_node+0xc0/0x2d0 mm/util.c:634\n   kvmalloc include/linux/slab.h:766 [inline]\n   init_data_container+0x49/0x1e0 fs/btrfs/backref.c:2779\n   btrfs_ioctl_logical_to_ino+0x17c/0x750 fs/btrfs/ioctl.c:3480\n   btrfs_ioctl+0x714/0x1260\n   vfs_ioctl fs/ioctl.c:51 [inline]\n   __do_sys_ioctl fs/ioctl.c:904 [inline]\n   __se_sys_ioctl+0x261/0x450 fs/ioctl.c:890\n   __x64_sys_ioctl+0x96/0xe0 fs/ioctl.c:890\n   x64_sys_call+0x1883/0x3b50 arch/x86/include/generated/asm/syscalls_64.h:17\n   do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n   do_syscall_64+0xcf/0x1e0 arch/x86/entry/common.c:83\n   entry_SYSCALL_64_after_hwframe+0x77/0x7f\n\n  Bytes 40-65535 of 65536 are uninitialized\n  Memory access of size 65536 starts at ffff888045a40000\n\nThis happens, because we\u0027re copying a \u0027struct btrfs_data_container\u0027 back\nto user-space. This btrfs_data_container is allocated in\n\u0027init_data_container()\u0027 via kvmalloc(), which does not zero-fill the\nmemory.\n\nFix this by using kvzalloc() which zeroes out the memory on allocation.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-35849",
          "url": "https://www.suse.com/security/cve/CVE-2024-35849"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1224733 for CVE-2024-35849",
          "url": "https://bugzilla.suse.com/1224733"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-24T18:34:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-35849"
    },
    {
      "cve": "CVE-2024-35877",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-35877"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nx86/mm/pat: fix VM_PAT handling in COW mappings\n\nPAT handling won\u0027t do the right thing in COW mappings: the first PTE (or,\nin fact, all PTEs) can be replaced during write faults to point at anon\nfolios.  Reliably recovering the correct PFN and cachemode using\nfollow_phys() from PTEs will not work in COW mappings.\n\nUsing follow_phys(), we might just get the address+protection of the anon\nfolio (which is very wrong), or fail on swap/nonswap entries, failing\nfollow_phys() and triggering a WARN_ON_ONCE() in untrack_pfn() and\ntrack_pfn_copy(), not properly calling free_pfn_range().\n\nIn free_pfn_range(), we either wouldn\u0027t call memtype_free() or would call\nit with the wrong range, possibly leaking memory.\n\nTo fix that, let\u0027s update follow_phys() to refuse returning anon folios,\nand fallback to using the stored PFN inside vma-\u003evm_pgoff for COW mappings\nif we run into that.\n\nWe will now properly handle untrack_pfn() with COW mappings, where we\ndon\u0027t need the cachemode.  We\u0027ll have to fail fork()-\u003etrack_pfn_copy() if\nthe first page was replaced by an anon folio, though: we\u0027d have to store\nthe cachemode in the VMA to make this work, likely growing the VMA size.\n\nFor now, lets keep it simple and let track_pfn_copy() just fail in that\ncase: it would have failed in the past with swap/nonswap entries already,\nand it would have done the wrong thing with anon folios.\n\nSimple reproducer to trigger the WARN_ON_ONCE() in untrack_pfn():\n\n\u003c--- C reproducer ---\u003e\n #include \u003cstdio.h\u003e\n #include \u003csys/mman.h\u003e\n #include \u003cunistd.h\u003e\n #include \u003cliburing.h\u003e\n\n int main(void)\n {\n         struct io_uring_params p = {};\n         int ring_fd;\n         size_t size;\n         char *map;\n\n         ring_fd = io_uring_setup(1, \u0026p);\n         if (ring_fd \u003c 0) {\n                 perror(\"io_uring_setup\");\n                 return 1;\n         }\n         size = p.sq_off.array + p.sq_entries * sizeof(unsigned);\n\n         /* Map the submission queue ring MAP_PRIVATE */\n         map = mmap(0, size, PROT_READ | PROT_WRITE, MAP_PRIVATE,\n                    ring_fd, IORING_OFF_SQ_RING);\n         if (map == MAP_FAILED) {\n                 perror(\"mmap\");\n                 return 1;\n         }\n\n         /* We have at least one page. Let\u0027s COW it. */\n         *map = 0;\n         pause();\n         return 0;\n }\n\u003c--- C reproducer ---\u003e\n\nOn a system with 16 GiB RAM and swap configured:\n # ./iouring \u0026\n # memhog 16G\n # killall iouring\n[  301.552930] ------------[ cut here ]------------\n[  301.553285] WARNING: CPU: 7 PID: 1402 at arch/x86/mm/pat/memtype.c:1060 untrack_pfn+0xf4/0x100\n[  301.553989] Modules linked in: binfmt_misc nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib nft_reject_g\n[  301.558232] CPU: 7 PID: 1402 Comm: iouring Not tainted 6.7.5-100.fc38.x86_64 #1\n[  301.558772] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.16.3-0-ga6ed6b701f0a-prebu4\n[  301.559569] RIP: 0010:untrack_pfn+0xf4/0x100\n[  301.559893] Code: 75 c4 eb cf 48 8b 43 10 8b a8 e8 00 00 00 3b 6b 28 74 b8 48 8b 7b 30 e8 ea 1a f7 000\n[  301.561189] RSP: 0018:ffffba2c0377fab8 EFLAGS: 00010282\n[  301.561590] RAX: 00000000ffffffea RBX: ffff9208c8ce9cc0 RCX: 000000010455e047\n[  301.562105] RDX: 07fffffff0eb1e0a RSI: 0000000000000000 RDI: ffff9208c391d200\n[  301.562628] RBP: 0000000000000000 R08: ffffba2c0377fab8 R09: 0000000000000000\n[  301.563145] R10: ffff9208d2292d50 R11: 0000000000000002 R12: 00007fea890e0000\n[  301.563669] R13: 0000000000000000 R14: ffffba2c0377fc08 R15: 0000000000000000\n[  301.564186] FS:  0000000000000000(0000) GS:ffff920c2fbc0000(0000) knlGS:0000000000000000\n[  301.564773] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[  301.565197] CR2: 00007fea88ee8a20 CR3: 00000001033a8000 CR4: 0000000000750ef0\n[  301.565725] PKRU: 55555554\n[  301.565944] Call Trace:\n[  301.566148]  \u003cTASK\u003e\n[  301.566325]  ? untrack_pfn+0xf4/0x100\n[  301.566618]  ? __warn+0x81/0x130\n[  301.566876]  ? untrack_pfn+0xf4/0x100\n[  3\n---truncated---",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-35877",
          "url": "https://www.suse.com/security/cve/CVE-2024-35877"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1224525 for CVE-2024-35877",
          "url": "https://bugzilla.suse.com/1224525"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-24T18:34:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-35877"
    },
    {
      "cve": "CVE-2024-35878",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-35878"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nof: module: prevent NULL pointer dereference in vsnprintf()\n\nIn of_modalias(), we can get passed the str and len parameters which would\ncause a kernel oops in vsnprintf() since it only allows passing a NULL ptr\nwhen the length is also 0. Also, we need to filter out the negative values\nof the len parameter as these will result in a really huge buffer since\nsnprintf() takes size_t parameter while ours is ssize_t...\n\nFound by Linux Verification Center (linuxtesting.org) with the Svace static\nanalysis tool.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-35878",
          "url": "https://www.suse.com/security/cve/CVE-2024-35878"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1224671 for CVE-2024-35878",
          "url": "https://bugzilla.suse.com/1224671"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-24T18:34:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-35878"
    },
    {
      "cve": "CVE-2024-35887",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-35887"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nax25: fix use-after-free bugs caused by ax25_ds_del_timer\n\nWhen the ax25 device is detaching, the ax25_dev_device_down()\ncalls ax25_ds_del_timer() to cleanup the slave_timer. When\nthe timer handler is running, the ax25_ds_del_timer() that\ncalls del_timer() in it will return directly. As a result,\nthe use-after-free bugs could happen, one of the scenarios\nis shown below:\n\n      (Thread 1)          |      (Thread 2)\n                          | ax25_ds_timeout()\nax25_dev_device_down()    |\n  ax25_ds_del_timer()     |\n    del_timer()           |\n  ax25_dev_put() //FREE   |\n                          |  ax25_dev-\u003e //USE\n\nIn order to mitigate bugs, when the device is detaching, use\ntimer_shutdown_sync() to stop the timer.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-35887",
          "url": "https://www.suse.com/security/cve/CVE-2024-35887"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1224663 for CVE-2024-35887",
          "url": "https://bugzilla.suse.com/1224663"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-24T18:34:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-35887"
    },
    {
      "cve": "CVE-2024-35895",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-35895"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf, sockmap: Prevent lock inversion deadlock in map delete elem\n\nsyzkaller started using corpuses where a BPF tracing program deletes\nelements from a sockmap/sockhash map. Because BPF tracing programs can be\ninvoked from any interrupt context, locks taken during a map_delete_elem\noperation must be hardirq-safe. Otherwise a deadlock due to lock inversion\nis possible, as reported by lockdep:\n\n       CPU0                    CPU1\n       ----                    ----\n  lock(\u0026htab-\u003ebuckets[i].lock);\n                               local_irq_disable();\n                               lock(\u0026host-\u003elock);\n                               lock(\u0026htab-\u003ebuckets[i].lock);\n  \u003cInterrupt\u003e\n    lock(\u0026host-\u003elock);\n\nLocks in sockmap are hardirq-unsafe by design. We expects elements to be\ndeleted from sockmap/sockhash only in task (normal) context with interrupts\nenabled, or in softirq context.\n\nDetect when map_delete_elem operation is invoked from a context which is\n_not_ hardirq-unsafe, that is interrupts are disabled, and bail out with an\nerror.\n\nNote that map updates are not affected by this issue. BPF verifier does not\nallow updating sockmap/sockhash from a BPF tracing program today.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-35895",
          "url": "https://www.suse.com/security/cve/CVE-2024-35895"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1224511 for CVE-2024-35895",
          "url": "https://bugzilla.suse.com/1224511"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-24T18:34:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-35895"
    },
    {
      "cve": "CVE-2024-35914",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-35914"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnfsd: Fix error cleanup path in nfsd_rename()\n\nCommit a8b0026847b8 (\"rename(): avoid a deadlock in the case of parents\nhaving no common ancestor\") added an error bail out path. However this\npath does not drop the remount protection that has been acquired. Fix\nthe cleanup path to properly drop the remount protection.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-35914",
          "url": "https://www.suse.com/security/cve/CVE-2024-35914"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1224482 for CVE-2024-35914",
          "url": "https://bugzilla.suse.com/1224482"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-24T18:34:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-35914"
    },
    {
      "cve": "CVE-2024-35932",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-35932"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/vc4: don\u0027t check if plane-\u003estate-\u003efb == state-\u003efb\n\nCurrently, when using non-blocking commits, we can see the following\nkernel warning:\n\n[  110.908514] ------------[ cut here ]------------\n[  110.908529] refcount_t: underflow; use-after-free.\n[  110.908620] WARNING: CPU: 0 PID: 1866 at lib/refcount.c:87 refcount_dec_not_one+0xb8/0xc0\n[  110.908664] Modules linked in: rfcomm snd_seq_dummy snd_hrtimer snd_seq snd_seq_device cmac algif_hash aes_arm64 aes_generic algif_skcipher af_alg bnep hid_logitech_hidpp vc4 brcmfmac hci_uart btbcm brcmutil bluetooth snd_soc_hdmi_codec cfg80211 cec drm_display_helper drm_dma_helper drm_kms_helper snd_soc_core snd_compress snd_pcm_dmaengine fb_sys_fops sysimgblt syscopyarea sysfillrect raspberrypi_hwmon ecdh_generic ecc rfkill libaes i2c_bcm2835 binfmt_misc joydev snd_bcm2835(C) bcm2835_codec(C) bcm2835_isp(C) v4l2_mem2mem videobuf2_dma_contig snd_pcm bcm2835_v4l2(C) raspberrypi_gpiomem bcm2835_mmal_vchiq(C) videobuf2_v4l2 snd_timer videobuf2_vmalloc videobuf2_memops videobuf2_common snd videodev vc_sm_cma(C) mc hid_logitech_dj uio_pdrv_genirq uio i2c_dev drm fuse dm_mod drm_panel_orientation_quirks backlight ip_tables x_tables ipv6\n[  110.909086] CPU: 0 PID: 1866 Comm: kodi.bin Tainted: G         C         6.1.66-v8+ #32\n[  110.909104] Hardware name: Raspberry Pi 3 Model B Rev 1.2 (DT)\n[  110.909114] pstate: 60000005 (nZCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)\n[  110.909132] pc : refcount_dec_not_one+0xb8/0xc0\n[  110.909152] lr : refcount_dec_not_one+0xb4/0xc0\n[  110.909170] sp : ffffffc00913b9c0\n[  110.909177] x29: ffffffc00913b9c0 x28: 000000556969bbb0 x27: 000000556990df60\n[  110.909205] x26: 0000000000000002 x25: 0000000000000004 x24: ffffff8004448480\n[  110.909230] x23: ffffff800570b500 x22: ffffff802e03a7bc x21: ffffffecfca68c78\n[  110.909257] x20: ffffff8002b42000 x19: ffffff802e03a600 x18: 0000000000000000\n[  110.909283] x17: 0000000000000011 x16: ffffffffffffffff x15: 0000000000000004\n[  110.909308] x14: 0000000000000fff x13: ffffffed577e47e0 x12: 0000000000000003\n[  110.909333] x11: 0000000000000000 x10: 0000000000000027 x9 : c912d0d083728c00\n[  110.909359] x8 : c912d0d083728c00 x7 : 65646e75203a745f x6 : 746e756f63666572\n[  110.909384] x5 : ffffffed579f62ee x4 : ffffffed579eb01e x3 : 0000000000000000\n[  110.909409] x2 : 0000000000000000 x1 : ffffffc00913b750 x0 : 0000000000000001\n[  110.909434] Call trace:\n[  110.909441]  refcount_dec_not_one+0xb8/0xc0\n[  110.909461]  vc4_bo_dec_usecnt+0x4c/0x1b0 [vc4]\n[  110.909903]  vc4_cleanup_fb+0x44/0x50 [vc4]\n[  110.910315]  drm_atomic_helper_cleanup_planes+0x88/0xa4 [drm_kms_helper]\n[  110.910669]  vc4_atomic_commit_tail+0x390/0x9dc [vc4]\n[  110.911079]  commit_tail+0xb0/0x164 [drm_kms_helper]\n[  110.911397]  drm_atomic_helper_commit+0x1d0/0x1f0 [drm_kms_helper]\n[  110.911716]  drm_atomic_commit+0xb0/0xdc [drm]\n[  110.912569]  drm_mode_atomic_ioctl+0x348/0x4b8 [drm]\n[  110.913330]  drm_ioctl_kernel+0xec/0x15c [drm]\n[  110.914091]  drm_ioctl+0x24c/0x3b0 [drm]\n[  110.914850]  __arm64_sys_ioctl+0x9c/0xd4\n[  110.914873]  invoke_syscall+0x4c/0x114\n[  110.914897]  el0_svc_common+0xd0/0x118\n[  110.914917]  do_el0_svc+0x38/0xd0\n[  110.914936]  el0_svc+0x30/0x8c\n[  110.914958]  el0t_64_sync_handler+0x84/0xf0\n[  110.914979]  el0t_64_sync+0x18c/0x190\n[  110.914996] ---[ end trace 0000000000000000 ]---\n\nThis happens because, although `prepare_fb` and `cleanup_fb` are\nperfectly balanced, we cannot guarantee consistency in the check\nplane-\u003estate-\u003efb == state-\u003efb. This means that sometimes we can increase\nthe refcount in `prepare_fb` and don\u0027t decrease it in `cleanup_fb`. The\nopposite can also be true.\n\nIn fact, the struct drm_plane .state shouldn\u0027t be accessed directly\nbut instead, the `drm_atomic_get_new_plane_state()` helper function should\nbe used. So, we could stick to this check, but using\n`drm_atomic_get_new_plane_state()`. But actually, this check is not re\n---truncated---",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-35932",
          "url": "https://www.suse.com/security/cve/CVE-2024-35932"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1224650 for CVE-2024-35932",
          "url": "https://bugzilla.suse.com/1224650"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-24T18:34:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-35932"
    },
    {
      "cve": "CVE-2024-35935",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-35935"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: send: handle path ref underflow in header iterate_inode_ref()\n\nChange BUG_ON to proper error handling if building the path buffer\nfails. The pointers are not printed so we don\u0027t accidentally leak kernel\naddresses.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-35935",
          "url": "https://www.suse.com/security/cve/CVE-2024-35935"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1224645 for CVE-2024-35935",
          "url": "https://bugzilla.suse.com/1224645"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-24T18:34:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-35935"
    },
    {
      "cve": "CVE-2024-35936",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-35936"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: handle chunk tree lookup error in btrfs_relocate_sys_chunks()\n\nThe unhandled case in btrfs_relocate_sys_chunks() loop is a corruption,\nas it could be caused only by two impossible conditions:\n\n- at first the search key is set up to look for a chunk tree item, with\n  offset -1, this is an inexact search and the key-\u003eoffset will contain\n  the correct offset upon a successful search, a valid chunk tree item\n  cannot have an offset -1\n\n- after first successful search, the found_key corresponds to a chunk\n  item, the offset is decremented by 1 before the next loop, it\u0027s\n  impossible to find a chunk item there due to alignment and size\n  constraints",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-35936",
          "url": "https://www.suse.com/security/cve/CVE-2024-35936"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1224644 for CVE-2024-35936",
          "url": "https://bugzilla.suse.com/1224644"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-24T18:34:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-35936"
    },
    {
      "cve": "CVE-2024-35944",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-35944"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nVMCI: Fix memcpy() run-time warning in dg_dispatch_as_host()\n\nSyzkaller hit \u0027WARNING in dg_dispatch_as_host\u0027 bug.\n\nmemcpy: detected field-spanning write (size 56) of single field \"\u0026dg_info-\u003emsg\"\nat drivers/misc/vmw_vmci/vmci_datagram.c:237 (size 24)\n\nWARNING: CPU: 0 PID: 1555 at drivers/misc/vmw_vmci/vmci_datagram.c:237\ndg_dispatch_as_host+0x88e/0xa60 drivers/misc/vmw_vmci/vmci_datagram.c:237\n\nSome code commentry, based on my understanding:\n\n544 #define VMCI_DG_SIZE(_dg) (VMCI_DG_HEADERSIZE + (size_t)(_dg)-\u003epayload_size)\n/// This is 24 + payload_size\n\nmemcpy(\u0026dg_info-\u003emsg, dg, dg_size);\n\tDestination = dg_info-\u003emsg ---\u003e this is a 24 byte\n\t\t\t\t\tstructure(struct vmci_datagram)\n\tSource = dg --\u003e this is a 24 byte structure (struct vmci_datagram)\n\tSize = dg_size = 24 + payload_size\n\n{payload_size = 56-24 =32} -- Syzkaller managed to set payload_size to 32.\n\n 35 struct delayed_datagram_info {\n 36         struct datagram_entry *entry;\n 37         struct work_struct work;\n 38         bool in_dg_host_queue;\n 39         /* msg and msg_payload must be together. */\n 40         struct vmci_datagram msg;\n 41         u8 msg_payload[];\n 42 };\n\nSo those extra bytes of payload are copied into msg_payload[], a run time\nwarning is seen while fuzzing with Syzkaller.\n\nOne possible way to fix the warning is to split the memcpy() into\ntwo parts -- one -- direct assignment of msg and second taking care of payload.\n\nGustavo quoted:\n\"Under FORTIFY_SOURCE we should not copy data across multiple members\nin a structure.\"",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-35944",
          "url": "https://www.suse.com/security/cve/CVE-2024-35944"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1224648 for CVE-2024-35944",
          "url": "https://bugzilla.suse.com/1224648"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-24T18:34:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-35944"
    },
    {
      "cve": "CVE-2024-35955",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-35955"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nkprobes: Fix possible use-after-free issue on kprobe registration\n\nWhen unloading a module, its state is changing MODULE_STATE_LIVE -\u003e\n MODULE_STATE_GOING -\u003e MODULE_STATE_UNFORMED. Each change will take\na time. `is_module_text_address()` and `__module_text_address()`\nworks with MODULE_STATE_LIVE and MODULE_STATE_GOING.\nIf we use `is_module_text_address()` and `__module_text_address()`\nseparately, there is a chance that the first one is succeeded but the\nnext one is failed because module-\u003estate becomes MODULE_STATE_UNFORMED\nbetween those operations.\n\nIn `check_kprobe_address_safe()`, if the second `__module_text_address()`\nis failed, that is ignored because it expected a kernel_text address.\nBut it may have failed simply because module-\u003estate has been changed\nto MODULE_STATE_UNFORMED. In this case, arm_kprobe() will try to modify\nnon-exist module text address (use-after-free).\n\nTo fix this problem, we should not use separated `is_module_text_address()`\nand `__module_text_address()`, but use only `__module_text_address()`\nonce and do `try_module_get(module)` which is only available with\nMODULE_STATE_LIVE.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-35955",
          "url": "https://www.suse.com/security/cve/CVE-2024-35955"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1224676 for CVE-2024-35955",
          "url": "https://bugzilla.suse.com/1224676"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-24T18:34:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-35955"
    },
    {
      "cve": "CVE-2024-35969",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-35969"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipv6: fix race condition between ipv6_get_ifaddr and ipv6_del_addr\n\nAlthough ipv6_get_ifaddr walks inet6_addr_lst under the RCU lock, it\nstill means hlist_for_each_entry_rcu can return an item that got removed\nfrom the list. The memory itself of such item is not freed thanks to RCU\nbut nothing guarantees the actual content of the memory is sane.\n\nIn particular, the reference count can be zero. This can happen if\nipv6_del_addr is called in parallel. ipv6_del_addr removes the entry\nfrom inet6_addr_lst (hlist_del_init_rcu(\u0026ifp-\u003eaddr_lst)) and drops all\nreferences (__in6_ifa_put(ifp) + in6_ifa_put(ifp)). With bad enough\ntiming, this can happen:\n\n1. In ipv6_get_ifaddr, hlist_for_each_entry_rcu returns an entry.\n\n2. Then, the whole ipv6_del_addr is executed for the given entry. The\n   reference count drops to zero and kfree_rcu is scheduled.\n\n3. ipv6_get_ifaddr continues and tries to increments the reference count\n   (in6_ifa_hold).\n\n4. The rcu is unlocked and the entry is freed.\n\n5. The freed entry is returned.\n\nPrevent increasing of the reference count in such case. The name\nin6_ifa_hold_safe is chosen to mimic the existing fib6_info_hold_safe.\n\n[   41.506330] refcount_t: addition on 0; use-after-free.\n[   41.506760] WARNING: CPU: 0 PID: 595 at lib/refcount.c:25 refcount_warn_saturate+0xa5/0x130\n[   41.507413] Modules linked in: veth bridge stp llc\n[   41.507821] CPU: 0 PID: 595 Comm: python3 Not tainted 6.9.0-rc2.main-00208-g49563be82afa #14\n[   41.508479] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996)\n[   41.509163] RIP: 0010:refcount_warn_saturate+0xa5/0x130\n[   41.509586] Code: ad ff 90 0f 0b 90 90 c3 cc cc cc cc 80 3d c0 30 ad 01 00 75 a0 c6 05 b7 30 ad 01 01 90 48 c7 c7 38 cc 7a 8c e8 cc 18 ad ff 90 \u003c0f\u003e 0b 90 90 c3 cc cc cc cc 80 3d 98 30 ad 01 00 0f 85 75 ff ff ff\n[   41.510956] RSP: 0018:ffffbda3c026baf0 EFLAGS: 00010282\n[   41.511368] RAX: 0000000000000000 RBX: ffff9e9c46914800 RCX: 0000000000000000\n[   41.511910] RDX: ffff9e9c7ec29c00 RSI: ffff9e9c7ec1c900 RDI: ffff9e9c7ec1c900\n[   41.512445] RBP: ffff9e9c43660c9c R08: 0000000000009ffb R09: 00000000ffffdfff\n[   41.512998] R10: 00000000ffffdfff R11: ffffffff8ca58a40 R12: ffff9e9c4339a000\n[   41.513534] R13: 0000000000000001 R14: ffff9e9c438a0000 R15: ffffbda3c026bb48\n[   41.514086] FS:  00007fbc4cda1740(0000) GS:ffff9e9c7ec00000(0000) knlGS:0000000000000000\n[   41.514726] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[   41.515176] CR2: 000056233b337d88 CR3: 000000000376e006 CR4: 0000000000370ef0\n[   41.515713] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n[   41.516252] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\n[   41.516799] Call Trace:\n[   41.517037]  \u003cTASK\u003e\n[   41.517249]  ? __warn+0x7b/0x120\n[   41.517535]  ? refcount_warn_saturate+0xa5/0x130\n[   41.517923]  ? report_bug+0x164/0x190\n[   41.518240]  ? handle_bug+0x3d/0x70\n[   41.518541]  ? exc_invalid_op+0x17/0x70\n[   41.520972]  ? asm_exc_invalid_op+0x1a/0x20\n[   41.521325]  ? refcount_warn_saturate+0xa5/0x130\n[   41.521708]  ipv6_get_ifaddr+0xda/0xe0\n[   41.522035]  inet6_rtm_getaddr+0x342/0x3f0\n[   41.522376]  ? __pfx_inet6_rtm_getaddr+0x10/0x10\n[   41.522758]  rtnetlink_rcv_msg+0x334/0x3d0\n[   41.523102]  ? netlink_unicast+0x30f/0x390\n[   41.523445]  ? __pfx_rtnetlink_rcv_msg+0x10/0x10\n[   41.523832]  netlink_rcv_skb+0x53/0x100\n[   41.524157]  netlink_unicast+0x23b/0x390\n[   41.524484]  netlink_sendmsg+0x1f2/0x440\n[   41.524826]  __sys_sendto+0x1d8/0x1f0\n[   41.525145]  __x64_sys_sendto+0x1f/0x30\n[   41.525467]  do_syscall_64+0xa5/0x1b0\n[   41.525794]  entry_SYSCALL_64_after_hwframe+0x72/0x7a\n[   41.526213] RIP: 0033:0x7fbc4cfcea9a\n[   41.526528] Code: d8 64 89 02 48 c7 c0 ff ff ff ff eb b8 0f 1f 00 f3 0f 1e fa 41 89 ca 64 8b 04 25 18 00 00 00 85 c0 75 15 b8 2c 00 00 00 0f 05 \u003c48\u003e 3d 00 f0 ff ff 77 7e c3 0f 1f 44 00 00 41 54 48 83 ec 30 44 89\n[   41.527942] RSP: 002b:00007f\n---truncated---",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-35969",
          "url": "https://www.suse.com/security/cve/CVE-2024-35969"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1224580 for CVE-2024-35969",
          "url": "https://bugzilla.suse.com/1224580"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-24T18:34:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-35969"
    },
    {
      "cve": "CVE-2024-35982",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-35982"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbatman-adv: Avoid infinite loop trying to resize local TT\n\nIf the MTU of one of an attached interface becomes too small to transmit\nthe local translation table then it must be resized to fit inside all\nfragments (when enabled) or a single packet.\n\nBut if the MTU becomes too low to transmit even the header + the VLAN\nspecific part then the resizing of the local TT will never succeed. This\ncan for example happen when the usable space is 110 bytes and 11 VLANs are\non top of batman-adv. In this case, at least 116 byte would be needed.\nThere will just be an endless spam of\n\n   batman_adv: batadv0: Forced to purge local tt entries to fit new maximum fragment MTU (110)\n\nin the log but the function will never finish. Problem here is that the\ntimeout will be halved all the time and will then stagnate at 0 and\ntherefore never be able to reduce the table even more.\n\nThere are other scenarios possible with a similar result. The number of\nBATADV_TT_CLIENT_NOPURGE entries in the local TT can for example be too\nhigh to fit inside a packet. Such a scenario can therefore happen also with\nonly a single VLAN + 7 non-purgable addresses - requiring at least 120\nbytes.\n\nWhile this should be handled proactively when:\n\n* interface with too low MTU is added\n* VLAN is added\n* non-purgeable local mac is added\n* MTU of an attached interface is reduced\n* fragmentation setting gets disabled (which most likely requires dropping\n  attached interfaces)\n\nnot all of these scenarios can be prevented because batman-adv is only\nconsuming events without the the possibility to prevent these actions\n(non-purgable MAC address added, MTU of an attached interface is reduced).\nIt is therefore necessary to also make sure that the code is able to handle\nalso the situations when there were already incompatible system\nconfiguration are present.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-35982",
          "url": "https://www.suse.com/security/cve/CVE-2024-35982"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1224566 for CVE-2024-35982",
          "url": "https://bugzilla.suse.com/1224566"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-24T18:34:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-35982"
    },
    {
      "cve": "CVE-2024-36015",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-36015"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nppdev: Add an error check in register_device\n\nIn register_device, the return value of ida_simple_get is unchecked,\nin witch ida_simple_get will use an invalid index value.\n\nTo address this issue, index should be checked after ida_simple_get. When\nthe index value is abnormal, a warning message should be printed, the port\nshould be dropped, and the value should be recorded.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-36015",
          "url": "https://www.suse.com/security/cve/CVE-2024-36015"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1225640 for CVE-2024-36015",
          "url": "https://bugzilla.suse.com/1225640"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-24T18:34:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-36015"
    },
    {
      "cve": "CVE-2024-36029",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-36029"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmmc: sdhci-msm: pervent access to suspended controller\n\nGeneric sdhci code registers LED device and uses host-\u003eruntime_suspended\nflag to protect access to it. The sdhci-msm driver doesn\u0027t set this flag,\nwhich causes a crash when LED is accessed while controller is runtime\nsuspended. Fix this by setting the flag correctly.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-36029",
          "url": "https://www.suse.com/security/cve/CVE-2024-36029"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1225708 for CVE-2024-36029",
          "url": "https://bugzilla.suse.com/1225708"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-24T18:34:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-36029"
    },
    {
      "cve": "CVE-2024-36954",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-36954"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntipc: fix a possible memleak in tipc_buf_append\n\n__skb_linearize() doesn\u0027t free the skb when it fails, so move\n\u0027*buf = NULL\u0027 after __skb_linearize(), so that the skb can be\nfreed on the err path.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-36954",
          "url": "https://www.suse.com/security/cve/CVE-2024-36954"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1225764 for CVE-2024-36954",
          "url": "https://bugzilla.suse.com/1225764"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-24T18:34:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-36954"
    }
  ]
}
  suse-su-2024:1979-1
Vulnerability from csaf_suse
Published
2024-06-11 07:41
    Modified
2024-06-11 07:41
    Summary
Security update for the Linux Kernel
    Notes
Title of the patch
Security update for the Linux Kernel
    Description of the patch
The SUSE Linux Enterprise 12 SP5 Azure kernel was updated to receive various security bugfixes.
The following security bugs were fixed:
- CVE-2024-26921: Preserve kabi for sk_buff (bsc#1223138).
- CVE-2022-48686: Fix UAF when detecting digest errors (bsc#1223948). Update blacklist.conf: remove entry
- CVE-2021-47074: Fixed memory leak in nvme_loop_create_ctrl() (bsc#1220854).
- CVE-2021-47378: Destroy cm id before destroy qp to avoid use after free (bsc#1225201).
- CVE-2022-48697: Fix a use-after-free (bsc#1223922). Update blacklist.conf: drop entry from it
- CVE-2024-26846: Do not wait in vain when unloading module (bsc#1223023).
- CVE-2021-47496: Fix flipped sign in tls_err_abort() calls (bsc#1225354)
- CVE-2023-42755: Check user supplied offsets (bsc#1215702).
- CVE-2023-52664: Eliminate double free in error handling logic (bsc#1224747).
- CVE-2023-52796: Add ipvlan_route_v6_outbound() helper (bsc#1224930).
- CVE-2021-47246: Fix page reclaim for dead peer hairpin (bsc#1224831).
- CVE-2023-52732: Blocklist the kclient when receiving corrupted snap trace (bsc#1225222 CVE-2023-52732).
- CVE-2024-35936: Add missing mutex_unlock in btrfs_relocate_sys_chunks() (bsc#1224644)
- CVE-2021-47548: Fixed a possible array out-of=bounds (bsc#1225506)
- CVE-2024-36029: Pervent access to suspended controller (bsc#1225708 CVE-2024-36029)
- CVE-2024-26625: Call sock_orphan() at release time (bsc#1221086)
- CVE-2021-47352: Add validation for used length (bsc#1225124).
- CVE-2023-52698: Fixed memory leak in netlbl_calipso_add_pass() (bsc#1224621)
- CVE-2021-47431: Fix gart.bo pin_count leak (bsc#1225390).
- CVE-2024-35935: Handle path ref underflow in header iterate_inode_ref() (bsc#1224645)
- CVE-2024-26828: Fixed underflow in parse_server_interfaces() (bsc#1223084).
- CVE-2021-47423: Fix file release memory leak (bsc#1225366).
- CVE-2022-48710: Fix a possible null pointer dereference (bsc#1225230).
- CVE-2021-47497: Fixed shift-out-of-bound (UBSAN) with byte size cells (bsc#1225355).
- CVE-2024-35932: Do not check if plane->state->fb == state->fb (bsc#1224650).
- CVE-2021-47500: Fixed trigger reference couting (bsc#1225360).
- CVE-2024-35809: Drain runtime-idle callbacks before driver removal (bsc#1224738).
- CVE-2021-47383: Fiedx out-of-bound vmalloc access in imageblit (bsc#1225208).
- CVE-2021-47511: Fixed negative period/buffer sizes (bsc#1225411).
- CVE-2021-47509: Limit the period size to 16MB (bsc#1225409).
- CVE-2024-35877: Fixed VM_PAT handling in COW mappings (bsc#1224525).
- CVE-2024-35982: Avoid infinite loop trying to resize local TT (bsc#1224566)
- CVE-2024-35969: Fixed race condition between ipv6_get_ifaddr and ipv6_del_addr (bsc#1224580).
- CVE-2021-47277: Avoid speculation-based attacks from out-of-range memslot accesses (bsc#1224960, CVE-2021-47277).
- CVE-2024-35791: Flush pages under kvm->lock to fix UAF in svm_register_enc_region() (bsc#1224725).
- CVE-2021-47401: Fix stack information leak (bsc#1225242).
- CVE-2023-52867: Fix possible buffer overflow (bsc#1225009).
- CVE-2023-52821: Fix a possible null pointer dereference (bsc#1225022).
- CVE-2021-47265: Verify port when creating flow rule (bsc#1224957)
- CVE-2021-47362: Update intermediate power state for SI (bsc#1225153).
- CVE-2021-47361: Fix error handling in mcb_alloc_bus() (bsc#1225151).
- CVE-2023-52864: Fix opening of char device (bsc#1225132).
- CVE-2022-48708: Fix potential NULL dereference (bsc#1224942).
- CVE-2024-35944: Fixed memcpy() run-time warning in dg_dispatch_as_host() (bsc#1224648).
- CVE-2021-47238: Fix memory leak in ip_mc_add1_src (bsc#1224847)
- CVE-2023-52730: Fix possible resource leaks in some error paths (bsc#1224956).
- CVE-2021-47355: Fix possible use-after-free in nicstar_cleanup() (bsc#1225141).
- CVE-2021-47245: Fix out of bounds when parsing TCP options (bsc#1224838)
- CVE-2024-35878: Prevent NULL pointer dereference in vsnprintf() (bsc#1224671).
- CVE-2023-52747: Restore allocated resources on failed copyout (bsc#1224931)
- CVE-2021-47249: Fix memory leak in rds_recvmsg (bsc#1224880)
- CVE-2021-47397: Break out if skb_header_pointer returns NULL in sctp_rcv_ootb (bsc#1225082)
- CVE-2021-47250: Fix memory leak in netlbl_cipsov4_add_std (bsc#1224827)
- CVE-2024-35849: Fix information leak in btrfs_ioctl_logical_to_ino() (bsc#1224733).
- CVE-2024-27436: Stop parsing channels bits when all channels are found (bsc#1224803).
- CVE-2021-47281: Fix race of snd_seq_timer_open() (bsc#1224983).
- CVE-2024-35789: Clear fast rx for non-4addr in VLAN netdev (bsc#1224749).
- CVE-2024-35830: Register v4l2 async device only after successful setup (bsc#1224680).
- CVE-2021-47334: Fix two use after free in ibmasm_init_one (bsc#1225112).
- CVE-2021-47357: Fix possible use-after-free in ia_module_exit() (bsc#1225144).
- CVE-2023-52875: Add check for mtk_alloc_clk_data (bsc#1225096).
- CVE-2023-52865: Add check for mtk_alloc_clk_data (bsc#1225086).
- CVE-2024-35887: Fix use-after-free bugs caused by ax25_ds_del_timer (bsc#1224663)
- CVE-2021-47483: Fixed possible double-free in regcache_rbtree_exit() (bsc#1224907).
- CVE-2024-26957: Fix reference counting on zcrypt card objects (bsc#1223666).
- CVE-2023-52691: Fix a double-free in si_dpm_init (bsc#1224607).
- CVE-2024-27398: Fixed use-after-free bugs caused by sco_sock_timeout (bsc#1224174).
- CVE-2023-52586: Fixed mutex lock in control vblank irq (bsc#1221081).
- CVE-2024-27062: Fixed nouveau lock inside client object tree (bsc#1223834).
- CVE-2024-26984: Fix instmem race condition around ptr stores (bsc#1223633)
- CVE-2021-46933: Fixed possible underflow in ffs_data_clear() (bsc#1220487).
- CVE-2024-27396: Fixed Use-After-Free in gtp_dellink (bsc#1224096).
- CVE-2023-52655: Check packet for fixup for true limit (bsc#1217169).
- CVE-2024-26900: Fixed kmemleak of rdev->serial (bsc#1223046).
- CVE-2024-27401: Fixed user_length taken into account when fetching packet contents (bsc#1224181).
- CVE-2024-26775: Fixed potential deadlock at set_capacity (bsc#1222627).
- CVE-2024-26958: Fixed UAF in direct writes (bsc#1223653).
- CVE-2022-48704: Add a force flush to delay work when radeon (bsc#1223932)
- CVE-2021-47206: Check return value after calling platform_get_resource() (bsc#1222894).
- CVE-2024-26915: Reset IH OVERFLOW_CLEAR bit (bsc#1223207)
- CVE-2024-26996: Fix UAF ncm object at re-bind after usb transport error (bsc#1223752).
- CVE-2024-26874: Fix a null pointer crash in mtk_drm_crtc_finish_page_flip (bsc#1223048)
- CVE-2023-1829: Fixed a use-after-free vulnerability in the control index filter (tcindex) (bsc#1210335).
The following non-security bugs were fixed:
- af_unix: annote lockless accesses to unix_tot_inflight & gc_in_progress (bsc#1223384).
- af_unix: Do not use atomic ops for unix_sk(sk)->inflight (bsc#1223384).
- af_unix: Replace BUG_ON() with WARN_ON_ONCE() (bsc#1223384).
- ASoC: tracing: Export SND_SOC_DAPM_DIR_OUT to its value (git-fixes).
- assoc_array: Fix BUG_ON during garbage collect.
- autofs: fix a leak in autofs_expire_indirect() (git-fixes)
- Bluetooth: btusb: Some Qualcomm Bluetooth adapters stop working (git-fixes).
- btrfs: avoid null pointer dereference on fs_info when calling btrfs_crit (git-fixes)
- btrfs: check if root is readonly while setting security xattr (git-fixes)
- btrfs: defrag: use btrfs_mod_outstanding_extents in cluster_pages_for_defrag (git-fixes)
- btrfs: do not get an EINTR during drop_snapshot for reloc (git-fixes)
- btrfs: do not stop integrity writeback too early (git-fixes)
- btrfs: Explicitly handle btrfs_update_root failure (git-fixes)
- btrfs: fail mount when sb flag is not in BTRFS_SUPER_FLAG_SUPP (git-fixes)
- btrfs: fix btrfs_prev_leaf() to not return the same key twice (git-fixes)
- btrfs: fix deadlock when writing out space cache (git-fixes)
- Btrfs: fix incorrect {node,sector}size endianness from BTRFS_IOC_FS_INFO (git-fixes)
- btrfs: fix lockdep splat and potential deadlock after failure running delayed items (git-fixes)
- btrfs: fix lost error handling when looking up extended ref on log replay (git-fixes)
- btrfs: Fix NULL pointer exception in find_bio_stripe (git-fixes)
- btrfs: Fix out of bounds access in btrfs_search_slot (git-fixes)
- btrfs: fix race when deleting quota root from the dirty cow roots list (git-fixes)
- btrfs: fix range_end calculation in extent_write_locked_range (git-fixes)
- btrfs: fix return value mixup in btrfs_get_extent (git-fixes)
- btrfs: fix unaligned access in readdir (git-fixes)
- btrfs: limit device extents to the device size (git-fixes)
- btrfs: prevent to set invalid default subvolid (git-fixes)
- btrfs: record delayed inode root in transaction (git-fixes)
- btrfs: scrub: reject unsupported scrub flags (git-fixes)
- btrfs: send: ensure send_fd is writable (git-fixes)
- btrfs: send: in case of IO error log it (git-fixes)
- btrfs: send: limit number of clones and allocated memory size (git-fixes)
- btrfs: sysfs: use NOFS for device creation (git-fixes) Adjustment: add #include
- btrfs: tree-checker: add missing return after error in root_item (git-fixes)
- btrfs: tree-checker: add missing returns after data_ref alignment checks (git-fixes)
- btrfs: tree-checker: do not error out if extent ref hash does not match (git-fixes)
- btrfs: tree-checker: fix inline ref size in error messages (git-fixes)
- btrfs: tree-checker: Fix misleading group system information (git-fixes)
- btrfs: undo writable superblocke when sprouting fails (git-fixes)
- btrfs: validate qgroup inherit for SNAP_CREATE_V2 ioctl (git-fixes)
- ecryptfs: fix a memory leak bug in ecryptfs_init_messaging() (git-fixes)
- ecryptfs: fix a memory leak bug in parse_tag_1_packet() (git-fixes)
- ecryptfs: fix kernel panic with null dev_name (git-fixes)
- ecryptfs: Fix typo in message (git-fixes)
- ep_create_wakeup_source(): dentry name can change under you (git-fixes)
- exportfs_decode_fh(): negative pinned may become positive without the parent locked (git-fixes)
- fs/proc/proc_sysctl.c: fix the default values of i_uid/i_gid on /proc/sys inodes (git-fixes)
- fscrypt: clean up some BUG_ON()s in block encryption/decryption (git-fixes)
- ila: do not generate empty messages in ila_xlat_nl_cmd_get_mapping() (git-fixes).
- ipv4, ipv6: Fix handling of transhdrlen in __ip{,6}_append_data() (git-fixes).
- kprobes: Fix possible use-after-free issue on kprobe registration (git-fixes).
- KVM: s390: Check kvm pointer when testing KVM_CAP_S390_HPAGE_1M (git-fixes bsc#1225059).
- l2tp: pass correct message length to ip6_append_data (git-fixes).
- lib/mpi: use kcalloc in mpi_resize (git-fixes).
- list: fix a data-race around ep->rdllist (git-fixes).
- net: 9p: avoid freeing uninit memory in p9pdu_vreadf (git-fixes).
- net: tcp: fix unexcepted socket die when snd_wnd is 0 (git-fixes).
- net: usb: ax88179_178a: stop lying about skb->truesize (git-fixes).
- net: usb: smsc95xx: stop lying about skb->truesize (git-fixes).
- net: usb: sr9700: stop lying about skb->truesize (git-fixes).
- net: vmxnet3: Fix NULL pointer dereference in vmxnet3_rq_rx_complete() (bsc#1223360).
- net/smc: fix fallback failed while sendmsg with fastopen (git-fixes).
- netfilter: nf_queue: augment nfqa_cfg_policy (git-fixes).
- netfilter: nft_compat: explicitly reject ERROR and standard target (git-fixes).
- netfilter: x_tables: set module owner for icmp(6) matches (git-fixes).
- nfc: change order inside nfc_se_io error path (git-fixes).
- powerpc/pseries/lparcfg: drop error message from guest name lookup (bsc#1187716 ltc#193451 git-fixes).
- ppdev: Add an error check in register_device (git-fixes).
- rds: avoid unenecessary cong_update in loop transport (git-fixes).
- rds: ib: Fix missing call to rds_ib_dev_put in rds_ib_setup_qp (git-fixes).
- ring-buffer: Clean ring_buffer_poll_wait() error return (git-fixes).
- ring-buffer: Fix a race between readers and resize checks (bsc#1222893).
- rxrpc: Do not put crypto buffers on the stack (git-fixes).
- rxrpc: Fix a memory leak in rxkad_verify_response() (git-fixes).
- rxrpc: Provide a different lockdep key for call->user_mutex for kernel calls (git-fixes).
- rxrpc: The mutex lock returned by rxrpc_accept_call() needs releasing (git-fixes).
- rxrpc: Work around usercopy check (git-fixes).
- s390/cpum_cf: make crypto counters upward compatible across machine types (bsc#1224347).
- s390/pci: fix max size calculation in zpci_memcpy_toio() (git-fixes bsc#1225062).
- tcp: tcp_make_synack() can be called from process context (git-fixes).
- tracing: Fix blocked reader of snapshot buffer (git-fixes).
- tracing: hide unused ftrace_event_id_fops (git-fixes).
- tracing: Use .flush() call to wake up readers (git-fixes).
- tracing: Use strncpy instead of memcpy when copying comm in trace.c (git-fixes).
- usb: aqc111: stop lying about skb->truesize (git-fixes).
- wifi: cfg80211: avoid leaking stack data into trace (git-fixes).
- wifi: radiotap: fix kernel-doc notation warnings (git-fixes).
    Patchnames
SUSE-2024-1979,SUSE-SLE-SERVER-12-SP5-2024-1979
    Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
    {
  "document": {
    "aggregate_severity": {
      "namespace": "https://www.suse.com/support/security/rating/",
      "text": "important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright 2024 SUSE LLC. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Security update for the Linux Kernel",
        "title": "Title of the patch"
      },
      {
        "category": "description",
        "text": "\nThe SUSE Linux Enterprise 12 SP5 Azure kernel was updated to receive various security bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2024-26921: Preserve kabi for sk_buff (bsc#1223138).\n- CVE-2022-48686: Fix UAF when detecting digest errors (bsc#1223948). Update blacklist.conf: remove entry\n- CVE-2021-47074: Fixed memory leak in nvme_loop_create_ctrl() (bsc#1220854).\n- CVE-2021-47378: Destroy cm id before destroy qp to avoid use after free (bsc#1225201).\n- CVE-2022-48697: Fix a use-after-free (bsc#1223922). Update blacklist.conf: drop entry from it\n- CVE-2024-26846: Do not wait in vain when unloading module (bsc#1223023).\n- CVE-2021-47496: Fix flipped sign in tls_err_abort() calls (bsc#1225354)\n- CVE-2023-42755: Check user supplied offsets (bsc#1215702).\n- CVE-2023-52664: Eliminate double free in error handling logic (bsc#1224747).\n- CVE-2023-52796: Add ipvlan_route_v6_outbound() helper (bsc#1224930).\n- CVE-2021-47246: Fix page reclaim for dead peer hairpin (bsc#1224831).\n- CVE-2023-52732: Blocklist the kclient when receiving corrupted snap trace (bsc#1225222 CVE-2023-52732).\n- CVE-2024-35936: Add missing mutex_unlock in btrfs_relocate_sys_chunks() (bsc#1224644)\n- CVE-2021-47548: Fixed a possible array out-of=bounds (bsc#1225506)\n- CVE-2024-36029: Pervent access to suspended controller (bsc#1225708 CVE-2024-36029)\n- CVE-2024-26625: Call sock_orphan() at release time (bsc#1221086)\n- CVE-2021-47352: Add validation for used length (bsc#1225124).\n- CVE-2023-52698: Fixed memory leak in netlbl_calipso_add_pass() (bsc#1224621)\n- CVE-2021-47431: Fix gart.bo pin_count leak (bsc#1225390).\n- CVE-2024-35935: Handle path ref underflow in header iterate_inode_ref() (bsc#1224645)\n- CVE-2024-26828: Fixed underflow in parse_server_interfaces() (bsc#1223084).\n- CVE-2021-47423: Fix file release memory leak (bsc#1225366).\n- CVE-2022-48710: Fix a possible null pointer dereference (bsc#1225230).\n- CVE-2021-47497: Fixed shift-out-of-bound (UBSAN) with byte size cells (bsc#1225355).\n- CVE-2024-35932: Do not check if plane-\u003estate-\u003efb == state-\u003efb (bsc#1224650).\n- CVE-2021-47500: Fixed trigger reference couting (bsc#1225360).\n- CVE-2024-35809: Drain runtime-idle callbacks before driver removal (bsc#1224738).\n- CVE-2021-47383: Fiedx out-of-bound vmalloc access in imageblit (bsc#1225208).\n- CVE-2021-47511: Fixed negative period/buffer sizes (bsc#1225411).\n- CVE-2021-47509: Limit the period size to 16MB (bsc#1225409).\n- CVE-2024-35877: Fixed VM_PAT handling in COW mappings (bsc#1224525).\n- CVE-2024-35982: Avoid infinite loop trying to resize local TT (bsc#1224566)\n- CVE-2024-35969: Fixed race condition between ipv6_get_ifaddr and ipv6_del_addr (bsc#1224580).\n- CVE-2021-47277: Avoid speculation-based attacks from out-of-range memslot accesses (bsc#1224960, CVE-2021-47277).\n- CVE-2024-35791: Flush pages under kvm-\u003elock to fix UAF in svm_register_enc_region() (bsc#1224725).\n- CVE-2021-47401: Fix stack information leak (bsc#1225242).\n- CVE-2023-52867: Fix possible buffer overflow (bsc#1225009).\n- CVE-2023-52821: Fix a possible null pointer dereference (bsc#1225022).\n- CVE-2021-47265: Verify port when creating flow rule (bsc#1224957)\n- CVE-2021-47362: Update intermediate power state for SI (bsc#1225153).\n- CVE-2021-47361: Fix error handling in mcb_alloc_bus() (bsc#1225151).\n- CVE-2023-52864: Fix opening of char device (bsc#1225132).\n- CVE-2022-48708: Fix potential NULL dereference (bsc#1224942).\n- CVE-2024-35944: Fixed memcpy() run-time warning in dg_dispatch_as_host() (bsc#1224648).\n- CVE-2021-47238: Fix memory leak in ip_mc_add1_src (bsc#1224847)\n- CVE-2023-52730: Fix possible resource leaks in some error paths (bsc#1224956).\n- CVE-2021-47355: Fix possible use-after-free in nicstar_cleanup() (bsc#1225141).\n- CVE-2021-47245: Fix out of bounds when parsing TCP options (bsc#1224838)\n- CVE-2024-35878: Prevent NULL pointer dereference in vsnprintf() (bsc#1224671).\n- CVE-2023-52747: Restore allocated resources on failed copyout (bsc#1224931)\n- CVE-2021-47249: Fix memory leak in rds_recvmsg (bsc#1224880)\n- CVE-2021-47397: Break out if skb_header_pointer returns NULL in sctp_rcv_ootb (bsc#1225082)\n- CVE-2021-47250: Fix memory leak in netlbl_cipsov4_add_std (bsc#1224827)\n- CVE-2024-35849: Fix information leak in btrfs_ioctl_logical_to_ino() (bsc#1224733).\n- CVE-2024-27436: Stop parsing channels bits when all channels are found (bsc#1224803).\n- CVE-2021-47281: Fix race of snd_seq_timer_open() (bsc#1224983).\n- CVE-2024-35789: Clear fast rx for non-4addr in VLAN netdev (bsc#1224749).\n- CVE-2024-35830: Register v4l2 async device only after successful setup (bsc#1224680).\n- CVE-2021-47334: Fix two use after free in ibmasm_init_one (bsc#1225112).\n- CVE-2021-47357: Fix possible use-after-free in ia_module_exit() (bsc#1225144).\n- CVE-2023-52875: Add check for mtk_alloc_clk_data (bsc#1225096).\n- CVE-2023-52865: Add check for mtk_alloc_clk_data (bsc#1225086).\n- CVE-2024-35887: Fix use-after-free bugs caused by ax25_ds_del_timer (bsc#1224663)\n- CVE-2021-47483: Fixed possible double-free in regcache_rbtree_exit() (bsc#1224907).\n- CVE-2024-26957: Fix reference counting on zcrypt card objects (bsc#1223666).\n- CVE-2023-52691: Fix a double-free in si_dpm_init (bsc#1224607).\n- CVE-2024-27398: Fixed use-after-free bugs caused by sco_sock_timeout (bsc#1224174).\n- CVE-2023-52586: Fixed mutex lock in control vblank irq (bsc#1221081).\n- CVE-2024-27062: Fixed nouveau lock inside client object tree (bsc#1223834).\n- CVE-2024-26984: Fix instmem race condition around ptr stores (bsc#1223633)\n- CVE-2021-46933: Fixed possible underflow in ffs_data_clear() (bsc#1220487).\n- CVE-2024-27396: Fixed Use-After-Free in gtp_dellink (bsc#1224096).\n- CVE-2023-52655: Check packet for fixup for true limit (bsc#1217169).\n- CVE-2024-26900: Fixed kmemleak of rdev-\u003eserial (bsc#1223046).\n- CVE-2024-27401: Fixed user_length taken into account when fetching packet contents (bsc#1224181).\n- CVE-2024-26775: Fixed potential deadlock at set_capacity (bsc#1222627).\n- CVE-2024-26958: Fixed UAF in direct writes (bsc#1223653).\n- CVE-2022-48704: Add a force flush to delay work when radeon (bsc#1223932)\n- CVE-2021-47206: Check return value after calling platform_get_resource() (bsc#1222894).\n- CVE-2024-26915: Reset IH OVERFLOW_CLEAR bit (bsc#1223207)\n- CVE-2024-26996: Fix UAF ncm object at re-bind after usb transport error (bsc#1223752).\n- CVE-2024-26874: Fix a null pointer crash in mtk_drm_crtc_finish_page_flip (bsc#1223048)\n- CVE-2023-1829: Fixed a use-after-free vulnerability in the control index filter (tcindex) (bsc#1210335).\n\nThe following non-security bugs were fixed:\n\n- af_unix: annote lockless accesses to unix_tot_inflight \u0026 gc_in_progress (bsc#1223384).\n- af_unix: Do not use atomic ops for unix_sk(sk)-\u003einflight (bsc#1223384).\n- af_unix: Replace BUG_ON() with WARN_ON_ONCE() (bsc#1223384).\n- ASoC: tracing: Export SND_SOC_DAPM_DIR_OUT to its value (git-fixes).\n- assoc_array: Fix BUG_ON during garbage collect.\n- autofs: fix a leak in autofs_expire_indirect() (git-fixes)\n- Bluetooth: btusb: Some Qualcomm Bluetooth adapters stop working (git-fixes).\n- btrfs: avoid null pointer dereference on fs_info when calling btrfs_crit (git-fixes)\n- btrfs: check if root is readonly while setting security xattr (git-fixes)\n- btrfs: defrag: use btrfs_mod_outstanding_extents in cluster_pages_for_defrag (git-fixes)\n- btrfs: do not get an EINTR during drop_snapshot for reloc (git-fixes)\n- btrfs: do not stop integrity writeback too early (git-fixes)\n- btrfs: Explicitly handle btrfs_update_root failure (git-fixes)\n- btrfs: fail mount when sb flag is not in BTRFS_SUPER_FLAG_SUPP (git-fixes)\n- btrfs: fix btrfs_prev_leaf() to not return the same key twice (git-fixes)\n- btrfs: fix deadlock when writing out space cache (git-fixes)\n- Btrfs: fix incorrect {node,sector}size endianness from BTRFS_IOC_FS_INFO (git-fixes)\n- btrfs: fix lockdep splat and potential deadlock after failure running delayed items (git-fixes)\n- btrfs: fix lost error handling when looking up extended ref on log replay (git-fixes)\n- btrfs: Fix NULL pointer exception in find_bio_stripe (git-fixes)\n- btrfs: Fix out of bounds access in btrfs_search_slot (git-fixes)\n- btrfs: fix race when deleting quota root from the dirty cow roots list (git-fixes)\n- btrfs: fix range_end calculation in extent_write_locked_range (git-fixes)\n- btrfs: fix return value mixup in btrfs_get_extent (git-fixes)\n- btrfs: fix unaligned access in readdir (git-fixes)\n- btrfs: limit device extents to the device size (git-fixes)\n- btrfs: prevent to set invalid default subvolid (git-fixes)\n- btrfs: record delayed inode root in transaction (git-fixes)\n- btrfs: scrub: reject unsupported scrub flags (git-fixes)\n- btrfs: send: ensure send_fd is writable (git-fixes)\n- btrfs: send: in case of IO error log it (git-fixes)\n- btrfs: send: limit number of clones and allocated memory size (git-fixes)\n- btrfs: sysfs: use NOFS for device creation (git-fixes) Adjustment: add #include\n- btrfs: tree-checker: add missing return after error in root_item (git-fixes)\n- btrfs: tree-checker: add missing returns after data_ref alignment checks (git-fixes)\n- btrfs: tree-checker: do not error out if extent ref hash does not match (git-fixes)\n- btrfs: tree-checker: fix inline ref size in error messages (git-fixes)\n- btrfs: tree-checker: Fix misleading group system information (git-fixes)\n- btrfs: undo writable superblocke when sprouting fails (git-fixes)\n- btrfs: validate qgroup inherit for SNAP_CREATE_V2 ioctl (git-fixes)\n- ecryptfs: fix a memory leak bug in ecryptfs_init_messaging() (git-fixes)\n- ecryptfs: fix a memory leak bug in parse_tag_1_packet() (git-fixes)\n- ecryptfs: fix kernel panic with null dev_name (git-fixes)\n- ecryptfs: Fix typo in message (git-fixes)\n- ep_create_wakeup_source(): dentry name can change under you (git-fixes)\n- exportfs_decode_fh(): negative pinned may become positive without the parent locked (git-fixes)\n- fs/proc/proc_sysctl.c: fix the default values of i_uid/i_gid on /proc/sys inodes (git-fixes)\n- fscrypt: clean up some BUG_ON()s in block encryption/decryption (git-fixes)\n- ila: do not generate empty messages in ila_xlat_nl_cmd_get_mapping() (git-fixes).\n- ipv4, ipv6: Fix handling of transhdrlen in __ip{,6}_append_data() (git-fixes).\n- kprobes: Fix possible use-after-free issue on kprobe registration (git-fixes).\n- KVM: s390: Check kvm pointer when testing KVM_CAP_S390_HPAGE_1M (git-fixes bsc#1225059).\n- l2tp: pass correct message length to ip6_append_data (git-fixes).\n- lib/mpi: use kcalloc in mpi_resize (git-fixes).\n- list: fix a data-race around ep-\u003erdllist (git-fixes).\n- net: 9p: avoid freeing uninit memory in p9pdu_vreadf (git-fixes).\n- net: tcp: fix unexcepted socket die when snd_wnd is 0 (git-fixes).\n- net: usb: ax88179_178a: stop lying about skb-\u003etruesize (git-fixes).\n- net: usb: smsc95xx: stop lying about skb-\u003etruesize (git-fixes).\n- net: usb: sr9700: stop lying about skb-\u003etruesize (git-fixes).\n- net: vmxnet3: Fix NULL pointer dereference in vmxnet3_rq_rx_complete() (bsc#1223360).\n- net/smc: fix fallback failed while sendmsg with fastopen (git-fixes).\n- netfilter: nf_queue: augment nfqa_cfg_policy (git-fixes).\n- netfilter: nft_compat: explicitly reject ERROR and standard target (git-fixes).\n- netfilter: x_tables: set module owner for icmp(6) matches (git-fixes).\n- nfc: change order inside nfc_se_io error path (git-fixes).\n- powerpc/pseries/lparcfg: drop error message from guest name lookup (bsc#1187716 ltc#193451 git-fixes).\n- ppdev: Add an error check in register_device (git-fixes).\n- rds: avoid unenecessary cong_update in loop transport (git-fixes).\n- rds: ib: Fix missing call to rds_ib_dev_put in rds_ib_setup_qp (git-fixes).\n- ring-buffer: Clean ring_buffer_poll_wait() error return (git-fixes).\n- ring-buffer: Fix a race between readers and resize checks (bsc#1222893).\n- rxrpc: Do not put crypto buffers on the stack (git-fixes).\n- rxrpc: Fix a memory leak in rxkad_verify_response() (git-fixes).\n- rxrpc: Provide a different lockdep key for call-\u003euser_mutex for kernel calls (git-fixes).\n- rxrpc: The mutex lock returned by rxrpc_accept_call() needs releasing (git-fixes).\n- rxrpc: Work around usercopy check (git-fixes).\n- s390/cpum_cf: make crypto counters upward compatible across machine types (bsc#1224347).\n- s390/pci: fix max size calculation in zpci_memcpy_toio() (git-fixes bsc#1225062).\n- tcp: tcp_make_synack() can be called from process context (git-fixes).\n- tracing: Fix blocked reader of snapshot buffer (git-fixes).\n- tracing: hide unused ftrace_event_id_fops (git-fixes).\n- tracing: Use .flush() call to wake up readers (git-fixes).\n- tracing: Use strncpy instead of memcpy when copying comm in trace.c (git-fixes).\n- usb: aqc111: stop lying about skb-\u003etruesize (git-fixes).\n- wifi: cfg80211: avoid leaking stack data into trace (git-fixes).\n- wifi: radiotap: fix kernel-doc notation warnings (git-fixes).\n",
        "title": "Description of the patch"
      },
      {
        "category": "details",
        "text": "SUSE-2024-1979,SUSE-SLE-SERVER-12-SP5-2024-1979",
        "title": "Patchnames"
      },
      {
        "category": "legal_disclaimer",
        "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
        "title": "Terms of use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://www.suse.com/support/security/contact/",
      "name": "SUSE Product Security Team",
      "namespace": "https://www.suse.com/"
    },
    "references": [
      {
        "category": "external",
        "summary": "SUSE ratings",
        "url": "https://www.suse.com/support/security/rating/"
      },
      {
        "category": "self",
        "summary": "URL of this CSAF notice",
        "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2024_1979-1.json"
      },
      {
        "category": "self",
        "summary": "URL for SUSE-SU-2024:1979-1",
        "url": "https://www.suse.com/support/update/announcement/2024/suse-su-20241979-1/"
      },
      {
        "category": "self",
        "summary": "E-Mail link for SUSE-SU-2024:1979-1",
        "url": "https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1065729",
        "url": "https://bugzilla.suse.com/1065729"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1101816",
        "url": "https://bugzilla.suse.com/1101816"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1181674",
        "url": "https://bugzilla.suse.com/1181674"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1185902",
        "url": "https://bugzilla.suse.com/1185902"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1187716",
        "url": "https://bugzilla.suse.com/1187716"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188616",
        "url": "https://bugzilla.suse.com/1188616"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1190317",
        "url": "https://bugzilla.suse.com/1190317"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1190795",
        "url": "https://bugzilla.suse.com/1190795"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1191452",
        "url": "https://bugzilla.suse.com/1191452"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1194591",
        "url": "https://bugzilla.suse.com/1194591"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1197760",
        "url": "https://bugzilla.suse.com/1197760"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1206213",
        "url": "https://bugzilla.suse.com/1206213"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1206646",
        "url": "https://bugzilla.suse.com/1206646"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1207186",
        "url": "https://bugzilla.suse.com/1207186"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1209657",
        "url": "https://bugzilla.suse.com/1209657"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1210335",
        "url": "https://bugzilla.suse.com/1210335"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1215702",
        "url": "https://bugzilla.suse.com/1215702"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1216702",
        "url": "https://bugzilla.suse.com/1216702"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1217169",
        "url": "https://bugzilla.suse.com/1217169"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1217519",
        "url": "https://bugzilla.suse.com/1217519"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1220487",
        "url": "https://bugzilla.suse.com/1220487"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1220854",
        "url": "https://bugzilla.suse.com/1220854"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1220928",
        "url": "https://bugzilla.suse.com/1220928"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1221044",
        "url": "https://bugzilla.suse.com/1221044"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1221081",
        "url": "https://bugzilla.suse.com/1221081"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1221086",
        "url": "https://bugzilla.suse.com/1221086"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1221977",
        "url": "https://bugzilla.suse.com/1221977"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1221994",
        "url": "https://bugzilla.suse.com/1221994"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222619",
        "url": "https://bugzilla.suse.com/1222619"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222627",
        "url": "https://bugzilla.suse.com/1222627"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222667",
        "url": "https://bugzilla.suse.com/1222667"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222671",
        "url": "https://bugzilla.suse.com/1222671"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222893",
        "url": "https://bugzilla.suse.com/1222893"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222894",
        "url": "https://bugzilla.suse.com/1222894"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223023",
        "url": "https://bugzilla.suse.com/1223023"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223046",
        "url": "https://bugzilla.suse.com/1223046"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223048",
        "url": "https://bugzilla.suse.com/1223048"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223084",
        "url": "https://bugzilla.suse.com/1223084"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223138",
        "url": "https://bugzilla.suse.com/1223138"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223207",
        "url": "https://bugzilla.suse.com/1223207"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223360",
        "url": "https://bugzilla.suse.com/1223360"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223384",
        "url": "https://bugzilla.suse.com/1223384"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223633",
        "url": "https://bugzilla.suse.com/1223633"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223653",
        "url": "https://bugzilla.suse.com/1223653"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223666",
        "url": "https://bugzilla.suse.com/1223666"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223671",
        "url": "https://bugzilla.suse.com/1223671"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223738",
        "url": "https://bugzilla.suse.com/1223738"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223752",
        "url": "https://bugzilla.suse.com/1223752"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223834",
        "url": "https://bugzilla.suse.com/1223834"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223922",
        "url": "https://bugzilla.suse.com/1223922"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223932",
        "url": "https://bugzilla.suse.com/1223932"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223948",
        "url": "https://bugzilla.suse.com/1223948"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1224096",
        "url": "https://bugzilla.suse.com/1224096"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1224174",
        "url": "https://bugzilla.suse.com/1224174"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1224181",
        "url": "https://bugzilla.suse.com/1224181"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1224347",
        "url": "https://bugzilla.suse.com/1224347"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1224482",
        "url": "https://bugzilla.suse.com/1224482"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1224511",
        "url": "https://bugzilla.suse.com/1224511"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1224525",
        "url": "https://bugzilla.suse.com/1224525"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1224566",
        "url": "https://bugzilla.suse.com/1224566"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1224580",
        "url": "https://bugzilla.suse.com/1224580"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1224592",
        "url": "https://bugzilla.suse.com/1224592"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1224601",
        "url": "https://bugzilla.suse.com/1224601"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1224607",
        "url": "https://bugzilla.suse.com/1224607"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1224621",
        "url": "https://bugzilla.suse.com/1224621"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1224644",
        "url": "https://bugzilla.suse.com/1224644"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1224645",
        "url": "https://bugzilla.suse.com/1224645"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1224648",
        "url": "https://bugzilla.suse.com/1224648"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1224650",
        "url": "https://bugzilla.suse.com/1224650"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1224663",
        "url": "https://bugzilla.suse.com/1224663"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1224671",
        "url": "https://bugzilla.suse.com/1224671"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1224676",
        "url": "https://bugzilla.suse.com/1224676"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1224680",
        "url": "https://bugzilla.suse.com/1224680"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1224682",
        "url": "https://bugzilla.suse.com/1224682"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1224725",
        "url": "https://bugzilla.suse.com/1224725"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1224728",
        "url": "https://bugzilla.suse.com/1224728"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1224733",
        "url": "https://bugzilla.suse.com/1224733"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1224738",
        "url": "https://bugzilla.suse.com/1224738"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1224747",
        "url": "https://bugzilla.suse.com/1224747"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1224749",
        "url": "https://bugzilla.suse.com/1224749"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1224759",
        "url": "https://bugzilla.suse.com/1224759"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1224803",
        "url": "https://bugzilla.suse.com/1224803"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1224827",
        "url": "https://bugzilla.suse.com/1224827"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1224830",
        "url": "https://bugzilla.suse.com/1224830"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1224831",
        "url": "https://bugzilla.suse.com/1224831"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1224834",
        "url": "https://bugzilla.suse.com/1224834"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1224838",
        "url": "https://bugzilla.suse.com/1224838"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1224841",
        "url": "https://bugzilla.suse.com/1224841"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1224844",
        "url": "https://bugzilla.suse.com/1224844"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1224846",
        "url": "https://bugzilla.suse.com/1224846"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1224847",
        "url": "https://bugzilla.suse.com/1224847"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1224849",
        "url": "https://bugzilla.suse.com/1224849"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1224854",
        "url": "https://bugzilla.suse.com/1224854"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1224859",
        "url": "https://bugzilla.suse.com/1224859"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1224867",
        "url": "https://bugzilla.suse.com/1224867"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1224880",
        "url": "https://bugzilla.suse.com/1224880"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1224882",
        "url": "https://bugzilla.suse.com/1224882"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1224888",
        "url": "https://bugzilla.suse.com/1224888"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1224889",
        "url": "https://bugzilla.suse.com/1224889"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1224892",
        "url": "https://bugzilla.suse.com/1224892"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1224893",
        "url": "https://bugzilla.suse.com/1224893"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1224899",
        "url": "https://bugzilla.suse.com/1224899"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1224904",
        "url": "https://bugzilla.suse.com/1224904"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1224907",
        "url": "https://bugzilla.suse.com/1224907"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1224916",
        "url": "https://bugzilla.suse.com/1224916"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1224917",
        "url": "https://bugzilla.suse.com/1224917"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1224922",
        "url": "https://bugzilla.suse.com/1224922"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1224926",
        "url": "https://bugzilla.suse.com/1224926"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1224930",
        "url": "https://bugzilla.suse.com/1224930"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1224931",
        "url": "https://bugzilla.suse.com/1224931"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1224942",
        "url": "https://bugzilla.suse.com/1224942"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1224954",
        "url": "https://bugzilla.suse.com/1224954"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1224957",
        "url": "https://bugzilla.suse.com/1224957"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1224959",
        "url": "https://bugzilla.suse.com/1224959"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1224960",
        "url": "https://bugzilla.suse.com/1224960"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1224961",
        "url": "https://bugzilla.suse.com/1224961"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1224963",
        "url": "https://bugzilla.suse.com/1224963"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1224966",
        "url": "https://bugzilla.suse.com/1224966"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1224968",
        "url": "https://bugzilla.suse.com/1224968"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1224981",
        "url": "https://bugzilla.suse.com/1224981"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1224982",
        "url": "https://bugzilla.suse.com/1224982"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1224983",
        "url": "https://bugzilla.suse.com/1224983"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1224987",
        "url": "https://bugzilla.suse.com/1224987"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1224990",
        "url": "https://bugzilla.suse.com/1224990"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1224996",
        "url": "https://bugzilla.suse.com/1224996"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1225008",
        "url": "https://bugzilla.suse.com/1225008"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1225009",
        "url": "https://bugzilla.suse.com/1225009"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1225010",
        "url": "https://bugzilla.suse.com/1225010"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1225022",
        "url": "https://bugzilla.suse.com/1225022"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1225026",
        "url": "https://bugzilla.suse.com/1225026"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1225030",
        "url": "https://bugzilla.suse.com/1225030"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1225054",
        "url": "https://bugzilla.suse.com/1225054"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1225058",
        "url": "https://bugzilla.suse.com/1225058"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1225059",
        "url": "https://bugzilla.suse.com/1225059"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1225060",
        "url": "https://bugzilla.suse.com/1225060"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1225062",
        "url": "https://bugzilla.suse.com/1225062"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1225082",
        "url": "https://bugzilla.suse.com/1225082"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1225084",
        "url": "https://bugzilla.suse.com/1225084"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1225086",
        "url": "https://bugzilla.suse.com/1225086"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1225092",
        "url": "https://bugzilla.suse.com/1225092"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1225096",
        "url": "https://bugzilla.suse.com/1225096"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1225112",
        "url": "https://bugzilla.suse.com/1225112"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1225124",
        "url": "https://bugzilla.suse.com/1225124"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1225128",
        "url": "https://bugzilla.suse.com/1225128"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1225132",
        "url": "https://bugzilla.suse.com/1225132"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1225141",
        "url": "https://bugzilla.suse.com/1225141"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1225143",
        "url": "https://bugzilla.suse.com/1225143"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1225144",
        "url": "https://bugzilla.suse.com/1225144"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1225151",
        "url": "https://bugzilla.suse.com/1225151"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1225153",
        "url": "https://bugzilla.suse.com/1225153"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1225155",
        "url": "https://bugzilla.suse.com/1225155"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1225157",
        "url": "https://bugzilla.suse.com/1225157"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1225164",
        "url": "https://bugzilla.suse.com/1225164"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1225177",
        "url": "https://bugzilla.suse.com/1225177"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1225189",
        "url": "https://bugzilla.suse.com/1225189"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1225192",
        "url": "https://bugzilla.suse.com/1225192"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1225193",
        "url": "https://bugzilla.suse.com/1225193"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1225198",
        "url": "https://bugzilla.suse.com/1225198"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1225201",
        "url": "https://bugzilla.suse.com/1225201"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1225207",
        "url": "https://bugzilla.suse.com/1225207"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1225208",
        "url": "https://bugzilla.suse.com/1225208"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1225222",
        "url": "https://bugzilla.suse.com/1225222"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1225230",
        "url": "https://bugzilla.suse.com/1225230"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1225242",
        "url": "https://bugzilla.suse.com/1225242"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1225244",
        "url": "https://bugzilla.suse.com/1225244"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1225247",
        "url": "https://bugzilla.suse.com/1225247"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1225251",
        "url": "https://bugzilla.suse.com/1225251"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1225252",
        "url": "https://bugzilla.suse.com/1225252"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1225256",
        "url": "https://bugzilla.suse.com/1225256"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1225303",
        "url": "https://bugzilla.suse.com/1225303"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1225318",
        "url": "https://bugzilla.suse.com/1225318"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1225322",
        "url": "https://bugzilla.suse.com/1225322"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1225329",
        "url": "https://bugzilla.suse.com/1225329"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1225330",
        "url": "https://bugzilla.suse.com/1225330"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1225336",
        "url": "https://bugzilla.suse.com/1225336"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1225347",
        "url": "https://bugzilla.suse.com/1225347"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1225351",
        "url": "https://bugzilla.suse.com/1225351"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1225354",
        "url": "https://bugzilla.suse.com/1225354"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1225355",
        "url": "https://bugzilla.suse.com/1225355"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1225360",
        "url": "https://bugzilla.suse.com/1225360"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1225366",
        "url": "https://bugzilla.suse.com/1225366"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1225367",
        "url": "https://bugzilla.suse.com/1225367"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1225384",
        "url": "https://bugzilla.suse.com/1225384"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1225390",
        "url": "https://bugzilla.suse.com/1225390"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1225404",
        "url": "https://bugzilla.suse.com/1225404"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1225409",
        "url": "https://bugzilla.suse.com/1225409"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1225411",
        "url": "https://bugzilla.suse.com/1225411"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1225438",
        "url": "https://bugzilla.suse.com/1225438"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1225453",
        "url": "https://bugzilla.suse.com/1225453"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1225479",
        "url": "https://bugzilla.suse.com/1225479"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1225482",
        "url": "https://bugzilla.suse.com/1225482"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1225506",
        "url": "https://bugzilla.suse.com/1225506"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1225549",
        "url": "https://bugzilla.suse.com/1225549"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1225560",
        "url": "https://bugzilla.suse.com/1225560"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1225572",
        "url": "https://bugzilla.suse.com/1225572"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1225640",
        "url": "https://bugzilla.suse.com/1225640"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1225708",
        "url": "https://bugzilla.suse.com/1225708"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1225764",
        "url": "https://bugzilla.suse.com/1225764"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-46933 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-46933/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47074 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47074/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47162 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47162/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47171 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47171/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47188 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47188/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47206 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47206/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47220 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47220/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47229 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47229/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47231 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47231/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47235 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47235/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47236 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47236/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47237 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47237/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47238 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47238/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47239 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47239/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47245 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47245/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47246 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47246/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47248 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47248/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47249 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47249/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47250 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47250/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47252 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47252/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47254 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47254/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47258 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47258/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47260 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47260/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47261 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47261/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47265 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47265/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47269 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47269/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47274 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47274/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47276 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47276/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47277 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47277/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47280 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47280/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47281 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47281/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47284 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47284/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47285 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47285/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47288 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47288/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47301 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47301/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47302 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47302/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47305 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47305/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47307 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47307/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47308 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47308/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47310 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47310/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47311 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47311/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47314 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47314/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47315 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47315/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47319 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47319/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47320 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47320/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47321 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47321/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47323 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47323/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47324 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47324/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47330 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47330/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47334 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47334/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47337 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47337/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47343 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47343/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47344 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47344/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47345 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47345/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47347 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47347/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47352 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47352/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47353 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47353/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47355 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47355/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47356 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47356/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47357 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47357/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47361 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47361/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47362 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47362/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47369 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47369/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47375 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47375/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47378 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47378/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47382 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47382/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47383 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47383/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47391 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47391/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47397 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47397/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47400 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47400/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47401 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47401/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47404 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47404/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47409 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47409/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47416 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47416/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47423 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47423/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47424 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47424/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47431 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47431/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47435 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47435/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47436 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47436/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47456 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47456/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47458 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47458/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47460 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47460/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47469 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47469/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47472 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47472/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47473 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47473/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47478 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47478/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47480 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47480/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47483 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47483/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47485 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47485/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47495 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47495/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47496 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47496/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47497 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47497/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47500 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47500/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47506 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47506/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47509 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47509/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47511 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47511/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47523 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47523/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47541 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47541/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47548 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47548/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47565 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47565/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-48686 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-48686/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-48697 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-48697/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-48704 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-48704/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-48708 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-48708/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-48710 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-48710/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-0160 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-0160/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-1829 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-1829/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-42755 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-42755/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-47233 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-47233/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-52527 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-52527/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-52586 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-52586/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-52591 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-52591/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-52655 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-52655/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-52664 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-52664/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-52685 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-52685/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-52686 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-52686/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-52691 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-52691/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-52696 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-52696/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-52698 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-52698/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-52703 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-52703/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-52730 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-52730/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-52732 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-52732/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-52741 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-52741/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-52742 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-52742/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-52747 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-52747/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-52759 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-52759/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-52774 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-52774/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-52781 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-52781/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-52796 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-52796/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-52803 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-52803/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-52821 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-52821/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-52864 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-52864/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-52865 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-52865/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-52867 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-52867/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-52875 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-52875/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-52880 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-52880/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26625 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26625/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26752 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26752/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26775 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26775/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26828 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26828/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26846 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26846/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26874 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26874/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26900 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26900/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26915 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26915/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26920 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26920/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26921 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26921/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26934 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26934/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26957 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26957/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26958 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26958/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26984 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26984/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26996 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26996/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-27059 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-27059/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-27062 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-27062/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-27396 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-27396/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-27398 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-27398/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-27401 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-27401/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-27419 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-27419/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-27436 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-27436/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-35789 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-35789/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-35791 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-35791/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-35809 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-35809/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-35811 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-35811/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-35830 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-35830/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-35849 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-35849/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-35877 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-35877/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-35878 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-35878/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-35887 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-35887/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-35895 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-35895/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-35914 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-35914/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-35932 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-35932/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-35935 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-35935/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-35936 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-35936/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-35944 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-35944/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-35955 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-35955/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-35969 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-35969/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-35982 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-35982/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-35984 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-35984/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-36015 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-36015/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-36029 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-36029/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-36954 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-36954/"
      }
    ],
    "title": "Security update for the Linux Kernel",
    "tracking": {
      "current_release_date": "2024-06-11T07:41:39Z",
      "generator": {
        "date": "2024-06-11T07:41:39Z",
        "engine": {
          "name": "cve-database.git:bin/generate-csaf.pl",
          "version": "1"
        }
      },
      "id": "SUSE-SU-2024:1979-1",
      "initial_release_date": "2024-06-11T07:41:39Z",
      "revision_history": [
        {
          "date": "2024-06-11T07:41:39Z",
          "number": "1",
          "summary": "Current version"
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-devel-azure-4.12.14-16.188.1.noarch",
                "product": {
                  "name": "kernel-devel-azure-4.12.14-16.188.1.noarch",
                  "product_id": "kernel-devel-azure-4.12.14-16.188.1.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-source-azure-4.12.14-16.188.1.noarch",
                "product": {
                  "name": "kernel-source-azure-4.12.14-16.188.1.noarch",
                  "product_id": "kernel-source-azure-4.12.14-16.188.1.noarch"
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "cluster-md-kmp-azure-4.12.14-16.188.1.x86_64",
                "product": {
                  "name": "cluster-md-kmp-azure-4.12.14-16.188.1.x86_64",
                  "product_id": "cluster-md-kmp-azure-4.12.14-16.188.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "dlm-kmp-azure-4.12.14-16.188.1.x86_64",
                "product": {
                  "name": "dlm-kmp-azure-4.12.14-16.188.1.x86_64",
                  "product_id": "dlm-kmp-azure-4.12.14-16.188.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "gfs2-kmp-azure-4.12.14-16.188.1.x86_64",
                "product": {
                  "name": "gfs2-kmp-azure-4.12.14-16.188.1.x86_64",
                  "product_id": "gfs2-kmp-azure-4.12.14-16.188.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-azure-4.12.14-16.188.1.x86_64",
                "product": {
                  "name": "kernel-azure-4.12.14-16.188.1.x86_64",
                  "product_id": "kernel-azure-4.12.14-16.188.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-azure-base-4.12.14-16.188.1.x86_64",
                "product": {
                  "name": "kernel-azure-base-4.12.14-16.188.1.x86_64",
                  "product_id": "kernel-azure-base-4.12.14-16.188.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-azure-devel-4.12.14-16.188.1.x86_64",
                "product": {
                  "name": "kernel-azure-devel-4.12.14-16.188.1.x86_64",
                  "product_id": "kernel-azure-devel-4.12.14-16.188.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-azure-extra-4.12.14-16.188.1.x86_64",
                "product": {
                  "name": "kernel-azure-extra-4.12.14-16.188.1.x86_64",
                  "product_id": "kernel-azure-extra-4.12.14-16.188.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-azure-kgraft-devel-4.12.14-16.188.1.x86_64",
                "product": {
                  "name": "kernel-azure-kgraft-devel-4.12.14-16.188.1.x86_64",
                  "product_id": "kernel-azure-kgraft-devel-4.12.14-16.188.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-syms-azure-4.12.14-16.188.1.x86_64",
                "product": {
                  "name": "kernel-syms-azure-4.12.14-16.188.1.x86_64",
                  "product_id": "kernel-syms-azure-4.12.14-16.188.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kselftests-kmp-azure-4.12.14-16.188.1.x86_64",
                "product": {
                  "name": "kselftests-kmp-azure-4.12.14-16.188.1.x86_64",
                  "product_id": "kselftests-kmp-azure-4.12.14-16.188.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "ocfs2-kmp-azure-4.12.14-16.188.1.x86_64",
                "product": {
                  "name": "ocfs2-kmp-azure-4.12.14-16.188.1.x86_64",
                  "product_id": "ocfs2-kmp-azure-4.12.14-16.188.1.x86_64"
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Server 12 SP5",
                "product": {
                  "name": "SUSE Linux Enterprise Server 12 SP5",
                  "product_id": "SUSE Linux Enterprise Server 12 SP5",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sles:12:sp5"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
                "product": {
                  "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
                  "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sles_sap:12:sp5"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "SUSE Linux Enterprise"
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-azure-4.12.14-16.188.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
          "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64"
        },
        "product_reference": "kernel-azure-4.12.14-16.188.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-azure-base-4.12.14-16.188.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
          "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64"
        },
        "product_reference": "kernel-azure-base-4.12.14-16.188.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-azure-devel-4.12.14-16.188.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
          "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64"
        },
        "product_reference": "kernel-azure-devel-4.12.14-16.188.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-azure-4.12.14-16.188.1.noarch as component of SUSE Linux Enterprise Server 12 SP5",
          "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch"
        },
        "product_reference": "kernel-devel-azure-4.12.14-16.188.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-azure-4.12.14-16.188.1.noarch as component of SUSE Linux Enterprise Server 12 SP5",
          "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch"
        },
        "product_reference": "kernel-source-azure-4.12.14-16.188.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-azure-4.12.14-16.188.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
          "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
        },
        "product_reference": "kernel-syms-azure-4.12.14-16.188.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-azure-4.12.14-16.188.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64"
        },
        "product_reference": "kernel-azure-4.12.14-16.188.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-azure-base-4.12.14-16.188.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64"
        },
        "product_reference": "kernel-azure-base-4.12.14-16.188.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-azure-devel-4.12.14-16.188.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64"
        },
        "product_reference": "kernel-azure-devel-4.12.14-16.188.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-azure-4.12.14-16.188.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch"
        },
        "product_reference": "kernel-devel-azure-4.12.14-16.188.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-azure-4.12.14-16.188.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch"
        },
        "product_reference": "kernel-source-azure-4.12.14-16.188.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-azure-4.12.14-16.188.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
        },
        "product_reference": "kernel-syms-azure-4.12.14-16.188.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2021-46933",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-46933"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: gadget: f_fs: Clear ffs_eventfd in ffs_data_clear.\n\nffs_data_clear is indirectly called from both ffs_fs_kill_sb and\nffs_ep0_release, so it ends up being called twice when userland closes ep0\nand then unmounts f_fs.\nIf userland provided an eventfd along with function\u0027s USB descriptors, it\nends up calling eventfd_ctx_put as many times, causing a refcount\nunderflow.\nNULL-ify ffs_eventfd to prevent these extraneous eventfd_ctx_put calls.\n\nAlso, set epfiles to NULL right after de-allocating it, for readability.\n\nFor completeness, ffs_data_clear actually ends up being called thrice, the\nlast call being before the whole ffs structure gets freed, so when this\nspecific sequence happens there is a second underflow happening (but not\nbeing reported):\n\n/sys/kernel/debug/tracing# modprobe usb_f_fs\n/sys/kernel/debug/tracing# echo ffs_data_clear \u003e set_ftrace_filter\n/sys/kernel/debug/tracing# echo function \u003e current_tracer\n/sys/kernel/debug/tracing# echo 1 \u003e tracing_on\n(setup gadget, run and kill function userland process, teardown gadget)\n/sys/kernel/debug/tracing# echo 0 \u003e tracing_on\n/sys/kernel/debug/tracing# cat trace\n smartcard-openp-436     [000] .....  1946.208786: ffs_data_clear \u003c-ffs_data_closed\n smartcard-openp-431     [000] .....  1946.279147: ffs_data_clear \u003c-ffs_data_closed\n smartcard-openp-431     [000] .n...  1946.905512: ffs_data_clear \u003c-ffs_data_put\n\nWarning output corresponding to above trace:\n[ 1946.284139] WARNING: CPU: 0 PID: 431 at lib/refcount.c:28 refcount_warn_saturate+0x110/0x15c\n[ 1946.293094] refcount_t: underflow; use-after-free.\n[ 1946.298164] Modules linked in: usb_f_ncm(E) u_ether(E) usb_f_fs(E) hci_uart(E) btqca(E) btrtl(E) btbcm(E) btintel(E) bluetooth(E) nls_ascii(E) nls_cp437(E) vfat(E) fat(E) bcm2835_v4l2(CE) bcm2835_mmal_vchiq(CE) videobuf2_vmalloc(E) videobuf2_memops(E) sha512_generic(E) videobuf2_v4l2(E) sha512_arm(E) videobuf2_common(E) videodev(E) cpufreq_dt(E) snd_bcm2835(CE) brcmfmac(E) mc(E) vc4(E) ctr(E) brcmutil(E) snd_soc_core(E) snd_pcm_dmaengine(E) drbg(E) snd_pcm(E) snd_timer(E) snd(E) soundcore(E) drm_kms_helper(E) cec(E) ansi_cprng(E) rc_core(E) syscopyarea(E) raspberrypi_cpufreq(E) sysfillrect(E) sysimgblt(E) cfg80211(E) max17040_battery(OE) raspberrypi_hwmon(E) fb_sys_fops(E) regmap_i2c(E) ecdh_generic(E) rfkill(E) ecc(E) bcm2835_rng(E) rng_core(E) vchiq(CE) leds_gpio(E) libcomposite(E) fuse(E) configfs(E) ip_tables(E) x_tables(E) autofs4(E) ext4(E) crc16(E) mbcache(E) jbd2(E) crc32c_generic(E) sdhci_iproc(E) sdhci_pltfm(E) sdhci(E)\n[ 1946.399633] CPU: 0 PID: 431 Comm: smartcard-openp Tainted: G         C OE     5.15.0-1-rpi #1  Debian 5.15.3-1\n[ 1946.417950] Hardware name: BCM2835\n[ 1946.425442] Backtrace:\n[ 1946.432048] [\u003cc08d60a0\u003e] (dump_backtrace) from [\u003cc08d62ec\u003e] (show_stack+0x20/0x24)\n[ 1946.448226]  r7:00000009 r6:0000001c r5:c04a948c r4:c0a64e2c\n[ 1946.458412] [\u003cc08d62cc\u003e] (show_stack) from [\u003cc08d9ae0\u003e] (dump_stack+0x28/0x30)\n[ 1946.470380] [\u003cc08d9ab8\u003e] (dump_stack) from [\u003cc0123500\u003e] (__warn+0xe8/0x154)\n[ 1946.482067]  r5:c04a948c r4:c0a71dc8\n[ 1946.490184] [\u003cc0123418\u003e] (__warn) from [\u003cc08d6948\u003e] (warn_slowpath_fmt+0xa0/0xe4)\n[ 1946.506758]  r7:00000009 r6:0000001c r5:c0a71dc8 r4:c0a71e04\n[ 1946.517070] [\u003cc08d68ac\u003e] (warn_slowpath_fmt) from [\u003cc04a948c\u003e] (refcount_warn_saturate+0x110/0x15c)\n[ 1946.535309]  r8:c0100224 r7:c0dfcb84 r6:ffffffff r5:c3b84c00 r4:c24a17c0\n[ 1946.546708] [\u003cc04a937c\u003e] (refcount_warn_saturate) from [\u003cc0380134\u003e] (eventfd_ctx_put+0x48/0x74)\n[ 1946.564476] [\u003cc03800ec\u003e] (eventfd_ctx_put) from [\u003cbf5464e8\u003e] (ffs_data_clear+0xd0/0x118 [usb_f_fs])\n[ 1946.582664]  r5:c3b84c00 r4:c2695b00\n[ 1946.590668] [\u003cbf546418\u003e] (ffs_data_clear [usb_f_fs]) from [\u003cbf547cc0\u003e] (ffs_data_closed+0x9c/0x150 [usb_f_fs])\n[ 1946.609608]  r5:bf54d014 r4:c2695b00\n[ 1946.617522] [\u003cbf547c24\u003e] (ffs_data_closed [usb_f_fs]) from [\u003cbf547da0\u003e] (ffs_fs_kill_sb+0x2c/0x30 [usb_f_fs])\n[ 1946.636217]  r7:c0dfcb\n---truncated---",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-46933",
          "url": "https://www.suse.com/security/cve/CVE-2021-46933"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1220487 for CVE-2021-46933",
          "url": "https://bugzilla.suse.com/1220487"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-11T07:41:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-46933"
    },
    {
      "cve": "CVE-2021-47074",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47074"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnvme-loop: fix memory leak in nvme_loop_create_ctrl()\n\nWhen creating loop ctrl in nvme_loop_create_ctrl(), if nvme_init_ctrl()\nfails, the loop ctrl should be freed before jumping to the \"out\" label.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47074",
          "url": "https://www.suse.com/security/cve/CVE-2021-47074"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1220854 for CVE-2021-47074",
          "url": "https://bugzilla.suse.com/1220854"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-11T07:41:39Z",
          "details": "low"
        }
      ],
      "title": "CVE-2021-47074"
    },
    {
      "cve": "CVE-2021-47162",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47162"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntipc: skb_linearize the head skb when reassembling msgs\n\nIt\u0027s not a good idea to append the frag skb to a skb\u0027s frag_list if\nthe frag_list already has skbs from elsewhere, such as this skb was\ncreated by pskb_copy() where the frag_list was cloned (all the skbs\nin it were skb_get\u0027ed) and shared by multiple skbs.\n\nHowever, the new appended frag skb should have been only seen by the\ncurrent skb. Otherwise, it will cause use after free crashes as this\nappended frag skb are seen by multiple skbs but it only got skb_get\ncalled once.\n\nThe same thing happens with a skb updated by pskb_may_pull() with a\nskb_cloned skb. Li Shuang has reported quite a few crashes caused\nby this when doing testing over macvlan devices:\n\n  [] kernel BUG at net/core/skbuff.c:1970!\n  [] Call Trace:\n  []  skb_clone+0x4d/0xb0\n  []  macvlan_broadcast+0xd8/0x160 [macvlan]\n  []  macvlan_process_broadcast+0x148/0x150 [macvlan]\n  []  process_one_work+0x1a7/0x360\n  []  worker_thread+0x30/0x390\n\n  [] kernel BUG at mm/usercopy.c:102!\n  [] Call Trace:\n  []  __check_heap_object+0xd3/0x100\n  []  __check_object_size+0xff/0x16b\n  []  simple_copy_to_iter+0x1c/0x30\n  []  __skb_datagram_iter+0x7d/0x310\n  []  __skb_datagram_iter+0x2a5/0x310\n  []  skb_copy_datagram_iter+0x3b/0x90\n  []  tipc_recvmsg+0x14a/0x3a0 [tipc]\n  []  ____sys_recvmsg+0x91/0x150\n  []  ___sys_recvmsg+0x7b/0xc0\n\n  [] kernel BUG at mm/slub.c:305!\n  [] Call Trace:\n  []  \u003cIRQ\u003e\n  []  kmem_cache_free+0x3ff/0x400\n  []  __netif_receive_skb_core+0x12c/0xc40\n  []  ? kmem_cache_alloc+0x12e/0x270\n  []  netif_receive_skb_internal+0x3d/0xb0\n  []  ? get_rx_page_info+0x8e/0xa0 [be2net]\n  []  be_poll+0x6ef/0xd00 [be2net]\n  []  ? irq_exit+0x4f/0x100\n  []  net_rx_action+0x149/0x3b0\n\n  ...\n\nThis patch is to fix it by linearizing the head skb if it has frag_list\nset in tipc_buf_append(). Note that we choose to do this before calling\nskb_unshare(), as __skb_linearize() will avoid skb_copy(). Also, we can\nnot just drop the frag_list either as the early time.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47162",
          "url": "https://www.suse.com/security/cve/CVE-2021-47162"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1221977 for CVE-2021-47162",
          "url": "https://bugzilla.suse.com/1221977"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-11T07:41:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47162"
    },
    {
      "cve": "CVE-2021-47171",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47171"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: usb: fix memory leak in smsc75xx_bind\n\nSyzbot reported memory leak in smsc75xx_bind().\nThe problem was is non-freed memory in case of\nerrors after memory allocation.\n\nbacktrace:\n  [\u003cffffffff84245b62\u003e] kmalloc include/linux/slab.h:556 [inline]\n  [\u003cffffffff84245b62\u003e] kzalloc include/linux/slab.h:686 [inline]\n  [\u003cffffffff84245b62\u003e] smsc75xx_bind+0x7a/0x334 drivers/net/usb/smsc75xx.c:1460\n  [\u003cffffffff82b5b2e6\u003e] usbnet_probe+0x3b6/0xc30 drivers/net/usb/usbnet.c:1728",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47171",
          "url": "https://www.suse.com/security/cve/CVE-2021-47171"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1221994 for CVE-2021-47171",
          "url": "https://bugzilla.suse.com/1221994"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-11T07:41:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47171"
    },
    {
      "cve": "CVE-2021-47188",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47188"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: ufs: core: Improve SCSI abort handling\n\nThe following has been observed on a test setup:\n\nWARNING: CPU: 4 PID: 250 at drivers/scsi/ufs/ufshcd.c:2737 ufshcd_queuecommand+0x468/0x65c\nCall trace:\n ufshcd_queuecommand+0x468/0x65c\n scsi_send_eh_cmnd+0x224/0x6a0\n scsi_eh_test_devices+0x248/0x418\n scsi_eh_ready_devs+0xc34/0xe58\n scsi_error_handler+0x204/0x80c\n kthread+0x150/0x1b4\n ret_from_fork+0x10/0x30\n\nThat warning is triggered by the following statement:\n\n\tWARN_ON(lrbp-\u003ecmd);\n\nFix this warning by clearing lrbp-\u003ecmd from the abort handler.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47188",
          "url": "https://www.suse.com/security/cve/CVE-2021-47188"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222671 for CVE-2021-47188",
          "url": "https://bugzilla.suse.com/1222671"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-11T07:41:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47188"
    },
    {
      "cve": "CVE-2021-47206",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47206"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: host: ohci-tmio: check return value after calling platform_get_resource()\n\nIt will cause null-ptr-deref if platform_get_resource() returns NULL,\nwe need check the return value.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47206",
          "url": "https://www.suse.com/security/cve/CVE-2021-47206"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222894 for CVE-2021-47206",
          "url": "https://bugzilla.suse.com/1222894"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-11T07:41:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47206"
    },
    {
      "cve": "CVE-2021-47220",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47220"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47220",
          "url": "https://www.suse.com/security/cve/CVE-2021-47220"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1224859 for CVE-2021-47220",
          "url": "https://bugzilla.suse.com/1224859"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-11T07:41:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47220"
    },
    {
      "cve": "CVE-2021-47229",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47229"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nPCI: aardvark: Fix kernel panic during PIO transfer\n\nTrying to start a new PIO transfer by writing value 0 in PIO_START register\nwhen previous transfer has not yet completed (which is indicated by value 1\nin PIO_START) causes an External Abort on CPU, which results in kernel\npanic:\n\n    SError Interrupt on CPU0, code 0xbf000002 -- SError\n    Kernel panic - not syncing: Asynchronous SError Interrupt\n\nTo prevent kernel panic, it is required to reject a new PIO transfer when\nprevious one has not finished yet.\n\nIf previous PIO transfer is not finished yet, the kernel may issue a new\nPIO request only if the previous PIO transfer timed out.\n\nIn the past the root cause of this issue was incorrectly identified (as it\noften happens during link retraining or after link down event) and special\nhack was implemented in Trusted Firmware to catch all SError events in EL3,\nto ignore errors with code 0xbf000002 and not forwarding any other errors\nto kernel and instead throw panic from EL3 Trusted Firmware handler.\n\nLinks to discussion and patches about this issue:\nhttps://git.trustedfirmware.org/TF-A/trusted-firmware-a.git/commit/?id=3c7dcdac5c50\nhttps://lore.kernel.org/linux-pci/20190316161243.29517-1-repk@triplefau.lt/\nhttps://lore.kernel.org/linux-pci/971be151d24312cc533989a64bd454b4@www.loen.fr/\nhttps://review.trustedfirmware.org/c/TF-A/trusted-firmware-a/+/1541\n\nBut the real cause was the fact that during link retraining or after link\ndown event the PIO transfer may take longer time, up to the 1.44s until it\ntimes out. This increased probability that a new PIO transfer would be\nissued by kernel while previous one has not finished yet.\n\nAfter applying this change into the kernel, it is possible to revert the\nmentioned TF-A hack and SError events do not have to be caught in TF-A EL3.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47229",
          "url": "https://www.suse.com/security/cve/CVE-2021-47229"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1224854 for CVE-2021-47229",
          "url": "https://bugzilla.suse.com/1224854"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-11T07:41:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47229"
    },
    {
      "cve": "CVE-2021-47231",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47231"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncan: mcba_usb: fix memory leak in mcba_usb\n\nSyzbot reported memory leak in SocketCAN driver for Microchip CAN BUS\nAnalyzer Tool. The problem was in unfreed usb_coherent.\n\nIn mcba_usb_start() 20 coherent buffers are allocated and there is\nnothing, that frees them:\n\n1) In callback function the urb is resubmitted and that\u0027s all\n2) In disconnect function urbs are simply killed, but URB_FREE_BUFFER\n   is not set (see mcba_usb_start) and this flag cannot be used with\n   coherent buffers.\n\nFail log:\n| [ 1354.053291][ T8413] mcba_usb 1-1:0.0 can0: device disconnected\n| [ 1367.059384][ T8420] kmemleak: 20 new suspected memory leaks (see /sys/kernel/debug/kmem)\n\nSo, all allocated buffers should be freed with usb_free_coherent()\nexplicitly\n\nNOTE:\nThe same pattern for allocating and freeing coherent buffers\nis used in drivers/net/can/usb/kvaser_usb/kvaser_usb_core.c",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47231",
          "url": "https://www.suse.com/security/cve/CVE-2021-47231"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1224849 for CVE-2021-47231",
          "url": "https://bugzilla.suse.com/1224849"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-11T07:41:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47231"
    },
    {
      "cve": "CVE-2021-47235",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47235"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: ethernet: fix potential use-after-free in ec_bhf_remove\n\nstatic void ec_bhf_remove(struct pci_dev *dev)\n{\n...\n\tstruct ec_bhf_priv *priv = netdev_priv(net_dev);\n\n\tunregister_netdev(net_dev);\n\tfree_netdev(net_dev);\n\n\tpci_iounmap(dev, priv-\u003edma_io);\n\tpci_iounmap(dev, priv-\u003eio);\n...\n}\n\npriv is netdev private data, but it is used\nafter free_netdev(). It can cause use-after-free when accessing priv\npointer. So, fix it by moving free_netdev() after pci_iounmap()\ncalls.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47235",
          "url": "https://www.suse.com/security/cve/CVE-2021-47235"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1224844 for CVE-2021-47235",
          "url": "https://bugzilla.suse.com/1224844"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-11T07:41:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47235"
    },
    {
      "cve": "CVE-2021-47236",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47236"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: cdc_eem: fix tx fixup skb leak\n\nwhen usbnet transmit a skb, eem fixup it in eem_tx_fixup(),\nif skb_copy_expand() failed, it return NULL,\nusbnet_start_xmit() will have no chance to free original skb.\n\nfix it by free orginal skb in eem_tx_fixup() first,\nthen check skb clone status, if failed, return NULL to usbnet.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47236",
          "url": "https://www.suse.com/security/cve/CVE-2021-47236"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1224841 for CVE-2021-47236",
          "url": "https://bugzilla.suse.com/1224841"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-11T07:41:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47236"
    },
    {
      "cve": "CVE-2021-47237",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47237"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: hamradio: fix memory leak in mkiss_close\n\nMy local syzbot instance hit memory leak in\nmkiss_open()[1]. The problem was in missing\nfree_netdev() in mkiss_close().\n\nIn mkiss_open() netdevice is allocated and then\nregistered, but in mkiss_close() netdevice was\nonly unregistered, but not freed.\n\nFail log:\n\nBUG: memory leak\nunreferenced object 0xffff8880281ba000 (size 4096):\n  comm \"syz-executor.1\", pid 11443, jiffies 4295046091 (age 17.660s)\n  hex dump (first 32 bytes):\n    61 78 30 00 00 00 00 00 00 00 00 00 00 00 00 00  ax0.............\n    00 27 fa 2a 80 88 ff ff 00 00 00 00 00 00 00 00  .\u0027.*............\n  backtrace:\n    [\u003cffffffff81a27201\u003e] kvmalloc_node+0x61/0xf0\n    [\u003cffffffff8706e7e8\u003e] alloc_netdev_mqs+0x98/0xe80\n    [\u003cffffffff84e64192\u003e] mkiss_open+0xb2/0x6f0 [1]\n    [\u003cffffffff842355db\u003e] tty_ldisc_open+0x9b/0x110\n    [\u003cffffffff84236488\u003e] tty_set_ldisc+0x2e8/0x670\n    [\u003cffffffff8421f7f3\u003e] tty_ioctl+0xda3/0x1440\n    [\u003cffffffff81c9f273\u003e] __x64_sys_ioctl+0x193/0x200\n    [\u003cffffffff8911263a\u003e] do_syscall_64+0x3a/0xb0\n    [\u003cffffffff89200068\u003e] entry_SYSCALL_64_after_hwframe+0x44/0xae\n\nBUG: memory leak\nunreferenced object 0xffff8880141a9a00 (size 96):\n  comm \"syz-executor.1\", pid 11443, jiffies 4295046091 (age 17.660s)\n  hex dump (first 32 bytes):\n    e8 a2 1b 28 80 88 ff ff e8 a2 1b 28 80 88 ff ff  ...(.......(....\n    98 92 9c aa b0 40 02 00 00 00 00 00 00 00 00 00  .....@..........\n  backtrace:\n    [\u003cffffffff8709f68b\u003e] __hw_addr_create_ex+0x5b/0x310\n    [\u003cffffffff8709fb38\u003e] __hw_addr_add_ex+0x1f8/0x2b0\n    [\u003cffffffff870a0c7b\u003e] dev_addr_init+0x10b/0x1f0\n    [\u003cffffffff8706e88b\u003e] alloc_netdev_mqs+0x13b/0xe80\n    [\u003cffffffff84e64192\u003e] mkiss_open+0xb2/0x6f0 [1]\n    [\u003cffffffff842355db\u003e] tty_ldisc_open+0x9b/0x110\n    [\u003cffffffff84236488\u003e] tty_set_ldisc+0x2e8/0x670\n    [\u003cffffffff8421f7f3\u003e] tty_ioctl+0xda3/0x1440\n    [\u003cffffffff81c9f273\u003e] __x64_sys_ioctl+0x193/0x200\n    [\u003cffffffff8911263a\u003e] do_syscall_64+0x3a/0xb0\n    [\u003cffffffff89200068\u003e] entry_SYSCALL_64_after_hwframe+0x44/0xae\n\nBUG: memory leak\nunreferenced object 0xffff8880219bfc00 (size 512):\n  comm \"syz-executor.1\", pid 11443, jiffies 4295046091 (age 17.660s)\n  hex dump (first 32 bytes):\n    00 a0 1b 28 80 88 ff ff 80 8f b1 8d ff ff ff ff  ...(............\n    80 8f b1 8d ff ff ff ff 00 00 00 00 00 00 00 00  ................\n  backtrace:\n    [\u003cffffffff81a27201\u003e] kvmalloc_node+0x61/0xf0\n    [\u003cffffffff8706eec7\u003e] alloc_netdev_mqs+0x777/0xe80\n    [\u003cffffffff84e64192\u003e] mkiss_open+0xb2/0x6f0 [1]\n    [\u003cffffffff842355db\u003e] tty_ldisc_open+0x9b/0x110\n    [\u003cffffffff84236488\u003e] tty_set_ldisc+0x2e8/0x670\n    [\u003cffffffff8421f7f3\u003e] tty_ioctl+0xda3/0x1440\n    [\u003cffffffff81c9f273\u003e] __x64_sys_ioctl+0x193/0x200\n    [\u003cffffffff8911263a\u003e] do_syscall_64+0x3a/0xb0\n    [\u003cffffffff89200068\u003e] entry_SYSCALL_64_after_hwframe+0x44/0xae\n\nBUG: memory leak\nunreferenced object 0xffff888029b2b200 (size 256):\n  comm \"syz-executor.1\", pid 11443, jiffies 4295046091 (age 17.660s)\n  hex dump (first 32 bytes):\n    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................\n    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................\n  backtrace:\n    [\u003cffffffff81a27201\u003e] kvmalloc_node+0x61/0xf0\n    [\u003cffffffff8706f062\u003e] alloc_netdev_mqs+0x912/0xe80\n    [\u003cffffffff84e64192\u003e] mkiss_open+0xb2/0x6f0 [1]\n    [\u003cffffffff842355db\u003e] tty_ldisc_open+0x9b/0x110\n    [\u003cffffffff84236488\u003e] tty_set_ldisc+0x2e8/0x670\n    [\u003cffffffff8421f7f3\u003e] tty_ioctl+0xda3/0x1440\n    [\u003cffffffff81c9f273\u003e] __x64_sys_ioctl+0x193/0x200\n    [\u003cffffffff8911263a\u003e] do_syscall_64+0x3a/0xb0\n    [\u003cffffffff89200068\u003e] entry_SYSCALL_64_after_hwframe+0x44/0xae",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47237",
          "url": "https://www.suse.com/security/cve/CVE-2021-47237"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1224830 for CVE-2021-47237",
          "url": "https://bugzilla.suse.com/1224830"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-11T07:41:39Z",
          "details": "low"
        }
      ],
      "title": "CVE-2021-47237"
    },
    {
      "cve": "CVE-2021-47238",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47238"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: ipv4: fix memory leak in ip_mc_add1_src\n\nBUG: memory leak\nunreferenced object 0xffff888101bc4c00 (size 32):\n  comm \"syz-executor527\", pid 360, jiffies 4294807421 (age 19.329s)\n  hex dump (first 32 bytes):\n    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................\n    01 00 00 00 00 00 00 00 ac 14 14 bb 00 00 02 00 ................\n  backtrace:\n    [\u003c00000000f17c5244\u003e] kmalloc include/linux/slab.h:558 [inline]\n    [\u003c00000000f17c5244\u003e] kzalloc include/linux/slab.h:688 [inline]\n    [\u003c00000000f17c5244\u003e] ip_mc_add1_src net/ipv4/igmp.c:1971 [inline]\n    [\u003c00000000f17c5244\u003e] ip_mc_add_src+0x95f/0xdb0 net/ipv4/igmp.c:2095\n    [\u003c000000001cb99709\u003e] ip_mc_source+0x84c/0xea0 net/ipv4/igmp.c:2416\n    [\u003c0000000052cf19ed\u003e] do_ip_setsockopt net/ipv4/ip_sockglue.c:1294 [inline]\n    [\u003c0000000052cf19ed\u003e] ip_setsockopt+0x114b/0x30c0 net/ipv4/ip_sockglue.c:1423\n    [\u003c00000000477edfbc\u003e] raw_setsockopt+0x13d/0x170 net/ipv4/raw.c:857\n    [\u003c00000000e75ca9bb\u003e] __sys_setsockopt+0x158/0x270 net/socket.c:2117\n    [\u003c00000000bdb993a8\u003e] __do_sys_setsockopt net/socket.c:2128 [inline]\n    [\u003c00000000bdb993a8\u003e] __se_sys_setsockopt net/socket.c:2125 [inline]\n    [\u003c00000000bdb993a8\u003e] __x64_sys_setsockopt+0xba/0x150 net/socket.c:2125\n    [\u003c000000006a1ffdbd\u003e] do_syscall_64+0x40/0x80 arch/x86/entry/common.c:47\n    [\u003c00000000b11467c4\u003e] entry_SYSCALL_64_after_hwframe+0x44/0xae\n\nIn commit 24803f38a5c0 (\"igmp: do not remove igmp souce list info when set\nlink down\"), the ip_mc_clear_src() in ip_mc_destroy_dev() was removed,\nbecause it was also called in igmpv3_clear_delrec().\n\nRough callgraph:\n\ninetdev_destroy\n-\u003e ip_mc_destroy_dev\n     -\u003e igmpv3_clear_delrec\n        -\u003e ip_mc_clear_src\n-\u003e RCU_INIT_POINTER(dev-\u003eip_ptr, NULL)\n\nHowever, ip_mc_clear_src() called in igmpv3_clear_delrec() doesn\u0027t\nrelease in_dev-\u003emc_list-\u003esources. And RCU_INIT_POINTER() assigns the\nNULL to dev-\u003eip_ptr. As a result, in_dev cannot be obtained through\ninetdev_by_index() and then in_dev-\u003emc_list-\u003esources cannot be released\nby ip_mc_del1_src() in the sock_close. Rough call sequence goes like:\n\nsock_close\n-\u003e __sock_release\n   -\u003e inet_release\n      -\u003e ip_mc_drop_socket\n         -\u003e inetdev_by_index\n         -\u003e ip_mc_leave_src\n            -\u003e ip_mc_del_src\n               -\u003e ip_mc_del1_src\n\nSo we still need to call ip_mc_clear_src() in ip_mc_destroy_dev() to free\nin_dev-\u003emc_list-\u003esources.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47238",
          "url": "https://www.suse.com/security/cve/CVE-2021-47238"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1224847 for CVE-2021-47238",
          "url": "https://bugzilla.suse.com/1224847"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-11T07:41:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47238"
    },
    {
      "cve": "CVE-2021-47239",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47239"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: usb: fix possible use-after-free in smsc75xx_bind\n\nThe commit 46a8b29c6306 (\"net: usb: fix memory leak in smsc75xx_bind\")\nfails to clean up the work scheduled in smsc75xx_reset-\u003e\nsmsc75xx_set_multicast, which leads to use-after-free if the work is\nscheduled to start after the deallocation. In addition, this patch\nalso removes a dangling pointer - dev-\u003edata[0].\n\nThis patch calls cancel_work_sync to cancel the scheduled work and set\nthe dangling pointer to NULL.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47239",
          "url": "https://www.suse.com/security/cve/CVE-2021-47239"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1224846 for CVE-2021-47239",
          "url": "https://bugzilla.suse.com/1224846"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-11T07:41:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47239"
    },
    {
      "cve": "CVE-2021-47245",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47245"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: synproxy: Fix out of bounds when parsing TCP options\n\nThe TCP option parser in synproxy (synproxy_parse_options) could read\none byte out of bounds. When the length is 1, the execution flow gets\ninto the loop, reads one byte of the opcode, and if the opcode is\nneither TCPOPT_EOL nor TCPOPT_NOP, it reads one more byte, which exceeds\nthe length of 1.\n\nThis fix is inspired by commit 9609dad263f8 (\"ipv4: tcp_input: fix stack\nout of bounds when parsing TCP options.\").\n\nv2 changes:\n\nAdded an early return when length \u003c 0 to avoid calling\nskb_header_pointer with negative length.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47245",
          "url": "https://www.suse.com/security/cve/CVE-2021-47245"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1224838 for CVE-2021-47245",
          "url": "https://bugzilla.suse.com/1224838"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-11T07:41:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47245"
    },
    {
      "cve": "CVE-2021-47246",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47246"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/mlx5e: Fix page reclaim for dead peer hairpin\n\nWhen adding a hairpin flow, a firmware-side send queue is created for\nthe peer net device, which claims some host memory pages for its\ninternal ring buffer. If the peer net device is removed/unbound before\nthe hairpin flow is deleted, then the send queue is not destroyed which\nleads to a stack trace on pci device remove:\n\n[ 748.005230] mlx5_core 0000:08:00.2: wait_func:1094:(pid 12985): MANAGE_PAGES(0x108) timeout. Will cause a leak of a command resource\n[ 748.005231] mlx5_core 0000:08:00.2: reclaim_pages:514:(pid 12985): failed reclaiming pages: err -110\n[ 748.001835] mlx5_core 0000:08:00.2: mlx5_reclaim_root_pages:653:(pid 12985): failed reclaiming pages (-110) for func id 0x0\n[ 748.002171] ------------[ cut here ]------------\n[ 748.001177] FW pages counter is 4 after reclaiming all pages\n[ 748.001186] WARNING: CPU: 1 PID: 12985 at drivers/net/ethernet/mellanox/mlx5/core/pagealloc.c:685 mlx5_reclaim_startup_pages+0x34b/0x460 [mlx5_core]                      [  +0.002771] Modules linked in: cls_flower mlx5_ib mlx5_core ptp pps_core act_mirred sch_ingress openvswitch nsh xt_conntrack xt_MASQUERADE nf_conntrack_netlink nfnetlink xt_addrtype iptable_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 br_netfilter rpcrdma rdma_ucm ib_iser libiscsi scsi_transport_iscsi rdma_cm ib_umad ib_ipoib iw_cm ib_cm ib_uverbs ib_core overlay fuse [last unloaded: pps_core]\n[ 748.007225] CPU: 1 PID: 12985 Comm: tee Not tainted 5.12.0+ #1\n[ 748.001376] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014\n[ 748.002315] RIP: 0010:mlx5_reclaim_startup_pages+0x34b/0x460 [mlx5_core]\n[ 748.001679] Code: 28 00 00 00 0f 85 22 01 00 00 48 81 c4 b0 00 00 00 31 c0 5b 5d 41 5c 41 5d 41 5e 41 5f c3 48 c7 c7 40 cc 19 a1 e8 9f 71 0e e2 \u003c0f\u003e 0b e9 30 ff ff ff 48 c7 c7 a0 cc 19 a1 e8 8c 71 0e e2 0f 0b e9\n[ 748.003781] RSP: 0018:ffff88815220faf8 EFLAGS: 00010286\n[ 748.001149] RAX: 0000000000000000 RBX: ffff8881b4900280 RCX: 0000000000000000\n[ 748.001445] RDX: 0000000000000027 RSI: 0000000000000004 RDI: ffffed102a441f51\n[ 748.001614] RBP: 00000000000032b9 R08: 0000000000000001 R09: ffffed1054a15ee8\n[ 748.001446] R10: ffff8882a50af73b R11: ffffed1054a15ee7 R12: fffffbfff07c1e30\n[ 748.001447] R13: dffffc0000000000 R14: ffff8881b492cba8 R15: 0000000000000000\n[ 748.001429] FS:  00007f58bd08b580(0000) GS:ffff8882a5080000(0000) knlGS:0000000000000000\n[ 748.001695] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[ 748.001309] CR2: 000055a026351740 CR3: 00000001d3b48006 CR4: 0000000000370ea0\n[ 748.001506] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n[ 748.001483] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\n[ 748.001654] Call Trace:\n[ 748.000576]  ? mlx5_satisfy_startup_pages+0x290/0x290 [mlx5_core]\n[ 748.001416]  ? mlx5_cmd_teardown_hca+0xa2/0xd0 [mlx5_core]\n[ 748.001354]  ? mlx5_cmd_init_hca+0x280/0x280 [mlx5_core]\n[ 748.001203]  mlx5_function_teardown+0x30/0x60 [mlx5_core]\n[ 748.001275]  mlx5_uninit_one+0xa7/0xc0 [mlx5_core]\n[ 748.001200]  remove_one+0x5f/0xc0 [mlx5_core]\n[ 748.001075]  pci_device_remove+0x9f/0x1d0\n[ 748.000833]  device_release_driver_internal+0x1e0/0x490\n[ 748.001207]  unbind_store+0x19f/0x200\n[ 748.000942]  ? sysfs_file_ops+0x170/0x170\n[ 748.001000]  kernfs_fop_write_iter+0x2bc/0x450\n[ 748.000970]  new_sync_write+0x373/0x610\n[ 748.001124]  ? new_sync_read+0x600/0x600\n[ 748.001057]  ? lock_acquire+0x4d6/0x700\n[ 748.000908]  ? lockdep_hardirqs_on_prepare+0x400/0x400\n[ 748.001126]  ? fd_install+0x1c9/0x4d0\n[ 748.000951]  vfs_write+0x4d0/0x800\n[ 748.000804]  ksys_write+0xf9/0x1d0\n[ 748.000868]  ? __x64_sys_read+0xb0/0xb0\n[ 748.000811]  ? filp_open+0x50/0x50\n[ 748.000919]  ? syscall_enter_from_user_mode+0x1d/0x50\n[ 748.001223]  do_syscall_64+0x3f/0x80\n[ 748.000892]  entry_SYSCALL_64_after_hwframe+0x44/0xae\n[ 748.00\n---truncated---",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47246",
          "url": "https://www.suse.com/security/cve/CVE-2021-47246"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1224831 for CVE-2021-47246",
          "url": "https://bugzilla.suse.com/1224831"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-11T07:41:39Z",
          "details": "low"
        }
      ],
      "title": "CVE-2021-47246"
    },
    {
      "cve": "CVE-2021-47248",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47248"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nudp: fix race between close() and udp_abort()\n\nKaustubh reported and diagnosed a panic in udp_lib_lookup().\nThe root cause is udp_abort() racing with close(). Both\nracing functions acquire the socket lock, but udp{v6}_destroy_sock()\nrelease it before performing destructive actions.\n\nWe can\u0027t easily extend the socket lock scope to avoid the race,\ninstead use the SOCK_DEAD flag to prevent udp_abort from doing\nany action when the critical race happens.\n\nDiagnosed-and-tested-by: Kaustubh Pandey \u003ckapandey@codeaurora.org\u003e",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47248",
          "url": "https://www.suse.com/security/cve/CVE-2021-47248"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1224867 for CVE-2021-47248",
          "url": "https://bugzilla.suse.com/1224867"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.8,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-11T07:41:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47248"
    },
    {
      "cve": "CVE-2021-47249",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47249"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: rds: fix memory leak in rds_recvmsg\n\nSyzbot reported memory leak in rds. The problem\nwas in unputted refcount in case of error.\n\nint rds_recvmsg(struct socket *sock, struct msghdr *msg, size_t size,\n\t\tint msg_flags)\n{\n...\n\n\tif (!rds_next_incoming(rs, \u0026inc)) {\n\t\t...\n\t}\n\nAfter this \"if\" inc refcount incremented and\n\n\tif (rds_cmsg_recv(inc, msg, rs)) {\n\t\tret = -EFAULT;\n\t\tgoto out;\n\t}\n...\nout:\n\treturn ret;\n}\n\nin case of rds_cmsg_recv() fail the refcount won\u0027t be\ndecremented. And it\u0027s easy to see from ftrace log, that\nrds_inc_addref() don\u0027t have rds_inc_put() pair in\nrds_recvmsg() after rds_cmsg_recv()\n\n 1)               |  rds_recvmsg() {\n 1)   3.721 us    |    rds_inc_addref();\n 1)   3.853 us    |    rds_message_inc_copy_to_user();\n 1) + 10.395 us   |    rds_cmsg_recv();\n 1) + 34.260 us   |  }",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47249",
          "url": "https://www.suse.com/security/cve/CVE-2021-47249"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1224880 for CVE-2021-47249",
          "url": "https://bugzilla.suse.com/1224880"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-11T07:41:39Z",
          "details": "low"
        }
      ],
      "title": "CVE-2021-47249"
    },
    {
      "cve": "CVE-2021-47250",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47250"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: ipv4: fix memory leak in netlbl_cipsov4_add_std\n\nReported by syzkaller:\nBUG: memory leak\nunreferenced object 0xffff888105df7000 (size 64):\ncomm \"syz-executor842\", pid 360, jiffies 4294824824 (age 22.546s)\nhex dump (first 32 bytes):\n00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................\n00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................\nbacktrace:\n[\u003c00000000e67ed558\u003e] kmalloc include/linux/slab.h:590 [inline]\n[\u003c00000000e67ed558\u003e] kzalloc include/linux/slab.h:720 [inline]\n[\u003c00000000e67ed558\u003e] netlbl_cipsov4_add_std net/netlabel/netlabel_cipso_v4.c:145 [inline]\n[\u003c00000000e67ed558\u003e] netlbl_cipsov4_add+0x390/0x2340 net/netlabel/netlabel_cipso_v4.c:416\n[\u003c0000000006040154\u003e] genl_family_rcv_msg_doit.isra.0+0x20e/0x320 net/netlink/genetlink.c:739\n[\u003c00000000204d7a1c\u003e] genl_family_rcv_msg net/netlink/genetlink.c:783 [inline]\n[\u003c00000000204d7a1c\u003e] genl_rcv_msg+0x2bf/0x4f0 net/netlink/genetlink.c:800\n[\u003c00000000c0d6a995\u003e] netlink_rcv_skb+0x134/0x3d0 net/netlink/af_netlink.c:2504\n[\u003c00000000d78b9d2c\u003e] genl_rcv+0x24/0x40 net/netlink/genetlink.c:811\n[\u003c000000009733081b\u003e] netlink_unicast_kernel net/netlink/af_netlink.c:1314 [inline]\n[\u003c000000009733081b\u003e] netlink_unicast+0x4a0/0x6a0 net/netlink/af_netlink.c:1340\n[\u003c00000000d5fd43b8\u003e] netlink_sendmsg+0x789/0xc70 net/netlink/af_netlink.c:1929\n[\u003c000000000a2d1e40\u003e] sock_sendmsg_nosec net/socket.c:654 [inline]\n[\u003c000000000a2d1e40\u003e] sock_sendmsg+0x139/0x170 net/socket.c:674\n[\u003c00000000321d1969\u003e] ____sys_sendmsg+0x658/0x7d0 net/socket.c:2350\n[\u003c00000000964e16bc\u003e] ___sys_sendmsg+0xf8/0x170 net/socket.c:2404\n[\u003c000000001615e288\u003e] __sys_sendmsg+0xd3/0x190 net/socket.c:2433\n[\u003c000000004ee8b6a5\u003e] do_syscall_64+0x37/0x90 arch/x86/entry/common.c:47\n[\u003c00000000171c7cee\u003e] entry_SYSCALL_64_after_hwframe+0x44/0xae\n\nThe memory of doi_def-\u003emap.std pointing is allocated in\nnetlbl_cipsov4_add_std, but no place has freed it. It should be\nfreed in cipso_v4_doi_free which frees the cipso DOI resource.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47250",
          "url": "https://www.suse.com/security/cve/CVE-2021-47250"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1224827 for CVE-2021-47250",
          "url": "https://bugzilla.suse.com/1224827"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-11T07:41:39Z",
          "details": "low"
        }
      ],
      "title": "CVE-2021-47250"
    },
    {
      "cve": "CVE-2021-47252",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47252"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbatman-adv: Avoid WARN_ON timing related checks\n\nThe soft/batadv interface for a queued OGM can be changed during the time\nthe OGM was queued for transmission and when the OGM is actually\ntransmitted by the worker.\n\nBut WARN_ON must be used to denote kernel bugs and not to print simple\nwarnings. A warning can simply be printed using pr_warn.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47252",
          "url": "https://www.suse.com/security/cve/CVE-2021-47252"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1224882 for CVE-2021-47252",
          "url": "https://bugzilla.suse.com/1224882"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 0,
            "baseSeverity": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-11T07:41:39Z",
          "details": "low"
        }
      ],
      "title": "CVE-2021-47252"
    },
    {
      "cve": "CVE-2021-47254",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47254"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ngfs2: Fix use-after-free in gfs2_glock_shrink_scan\n\nThe GLF_LRU flag is checked under lru_lock in gfs2_glock_remove_from_lru() to\nremove the glock from the lru list in __gfs2_glock_put().\n\nOn the shrink scan path, the same flag is cleared under lru_lock but because\nof cond_resched_lock(\u0026lru_lock) in gfs2_dispose_glock_lru(), progress on the\nput side can be made without deleting the glock from the lru list.\n\nKeep GLF_LRU across the race window opened by cond_resched_lock(\u0026lru_lock) to\nensure correct behavior on both sides - clear GLF_LRU after list_del under\nlru_lock.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47254",
          "url": "https://www.suse.com/security/cve/CVE-2021-47254"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1224888 for CVE-2021-47254",
          "url": "https://bugzilla.suse.com/1224888"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1227559 for CVE-2021-47254",
          "url": "https://bugzilla.suse.com/1227559"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-11T07:41:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47254"
    },
    {
      "cve": "CVE-2021-47258",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47258"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: core: Fix error handling of scsi_host_alloc()\n\nAfter device is initialized via device_initialize(), or its name is set via\ndev_set_name(), the device has to be freed via put_device().  Otherwise\ndevice name will be leaked because it is allocated dynamically in\ndev_set_name().\n\nFix the leak by replacing kfree() with put_device(). Since\nscsi_host_dev_release() properly handles IDA and kthread removal, remove\nspecial-casing these from the error handling as well.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47258",
          "url": "https://www.suse.com/security/cve/CVE-2021-47258"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1224899 for CVE-2021-47258",
          "url": "https://bugzilla.suse.com/1224899"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-11T07:41:39Z",
          "details": "low"
        }
      ],
      "title": "CVE-2021-47258"
    },
    {
      "cve": "CVE-2021-47260",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47260"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nNFS: Fix a potential NULL dereference in nfs_get_client()\n\nNone of the callers are expecting NULL returns from nfs_get_client() so\nthis code will lead to an Oops.  It\u0027s better to return an error\npointer.  I expect that this is dead code so hopefully no one is\naffected.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47260",
          "url": "https://www.suse.com/security/cve/CVE-2021-47260"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1224834 for CVE-2021-47260",
          "url": "https://bugzilla.suse.com/1224834"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-11T07:41:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47260"
    },
    {
      "cve": "CVE-2021-47261",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47261"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nIB/mlx5: Fix initializing CQ fragments buffer\n\nThe function init_cq_frag_buf() can be called to initialize the current CQ\nfragments buffer cq-\u003ebuf, or the temporary cq-\u003eresize_buf that is filled\nduring CQ resize operation.\n\nHowever, the offending commit started to use function get_cqe() for\ngetting the CQEs, the issue with this change is that get_cqe() always\nreturns CQEs from cq-\u003ebuf, which leads us to initialize the wrong buffer,\nand in case of enlarging the CQ we try to access elements beyond the size\nof the current cq-\u003ebuf and eventually hit a kernel panic.\n\n [exception RIP: init_cq_frag_buf+103]\n  [ffff9f799ddcbcd8] mlx5_ib_resize_cq at ffffffffc0835d60 [mlx5_ib]\n  [ffff9f799ddcbdb0] ib_resize_cq at ffffffffc05270df [ib_core]\n  [ffff9f799ddcbdc0] llt_rdma_setup_qp at ffffffffc0a6a712 [llt]\n  [ffff9f799ddcbe10] llt_rdma_cc_event_action at ffffffffc0a6b411 [llt]\n  [ffff9f799ddcbe98] llt_rdma_client_conn_thread at ffffffffc0a6bb75 [llt]\n  [ffff9f799ddcbec8] kthread at ffffffffa66c5da1\n  [ffff9f799ddcbf50] ret_from_fork_nospec_begin at ffffffffa6d95ddd\n\nFix it by getting the needed CQE by calling mlx5_frag_buf_get_wqe() that\ntakes the correct source buffer as a parameter.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47261",
          "url": "https://www.suse.com/security/cve/CVE-2021-47261"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1224954 for CVE-2021-47261",
          "url": "https://bugzilla.suse.com/1224954"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1227751 for CVE-2021-47261",
          "url": "https://bugzilla.suse.com/1227751"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-11T07:41:39Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-47261"
    },
    {
      "cve": "CVE-2021-47265",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47265"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA: Verify port when creating flow rule\n\nValidate port value provided by the user and with that remove no longer\nneeded validation by the driver.  The missing check in the mlx5_ib driver\ncould cause to the below oops.\n\nCall trace:\n  _create_flow_rule+0x2d4/0xf28 [mlx5_ib]\n  mlx5_ib_create_flow+0x2d0/0x5b0 [mlx5_ib]\n  ib_uverbs_ex_create_flow+0x4cc/0x624 [ib_uverbs]\n  ib_uverbs_handler_UVERBS_METHOD_INVOKE_WRITE+0xd4/0x150 [ib_uverbs]\n  ib_uverbs_cmd_verbs.isra.7+0xb28/0xc50 [ib_uverbs]\n  ib_uverbs_ioctl+0x158/0x1d0 [ib_uverbs]\n  do_vfs_ioctl+0xd0/0xaf0\n  ksys_ioctl+0x84/0xb4\n  __arm64_sys_ioctl+0x28/0xc4\n  el0_svc_common.constprop.3+0xa4/0x254\n  el0_svc_handler+0x84/0xa0\n  el0_svc+0x10/0x26c\n Code: b9401260 f9615681 51000400 8b001c20 (f9403c1a)",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47265",
          "url": "https://www.suse.com/security/cve/CVE-2021-47265"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1224957 for CVE-2021-47265",
          "url": "https://bugzilla.suse.com/1224957"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-11T07:41:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47265"
    },
    {
      "cve": "CVE-2021-47269",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47269"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: dwc3: ep0: fix NULL pointer exception\n\nThere is no validation of the index from dwc3_wIndex_to_dep() and we might\nbe referring a non-existing ep and trigger a NULL pointer exception. In\ncertain configurations we might use fewer eps and the index might wrongly\nindicate a larger ep index than existing.\n\nBy adding this validation from the patch we can actually report a wrong\nindex back to the caller.\n\nIn our usecase we are using a composite device on an older kernel, but\nupstream might use this fix also. Unfortunately, I cannot describe the\nhardware for others to reproduce the issue as it is a proprietary\nimplementation.\n\n[   82.958261] Unable to handle kernel NULL pointer dereference at virtual address 00000000000000a4\n[   82.966891] Mem abort info:\n[   82.969663]   ESR = 0x96000006\n[   82.972703]   Exception class = DABT (current EL), IL = 32 bits\n[   82.978603]   SET = 0, FnV = 0\n[   82.981642]   EA = 0, S1PTW = 0\n[   82.984765] Data abort info:\n[   82.987631]   ISV = 0, ISS = 0x00000006\n[   82.991449]   CM = 0, WnR = 0\n[   82.994409] user pgtable: 4k pages, 39-bit VAs, pgdp = 00000000c6210ccc\n[   83.000999] [00000000000000a4] pgd=0000000053aa5003, pud=0000000053aa5003, pmd=0000000000000000\n[   83.009685] Internal error: Oops: 96000006 [#1] PREEMPT SMP\n[   83.026433] Process irq/62-dwc3 (pid: 303, stack limit = 0x000000003985154c)\n[   83.033470] CPU: 0 PID: 303 Comm: irq/62-dwc3 Not tainted 4.19.124 #1\n[   83.044836] pstate: 60000085 (nZCv daIf -PAN -UAO)\n[   83.049628] pc : dwc3_ep0_handle_feature+0x414/0x43c\n[   83.054558] lr : dwc3_ep0_interrupt+0x3b4/0xc94\n\n...\n\n[   83.141788] Call trace:\n[   83.144227]  dwc3_ep0_handle_feature+0x414/0x43c\n[   83.148823]  dwc3_ep0_interrupt+0x3b4/0xc94\n[   83.181546] ---[ end trace aac6b5267d84c32f ]---",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47269",
          "url": "https://www.suse.com/security/cve/CVE-2021-47269"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1224996 for CVE-2021-47269",
          "url": "https://bugzilla.suse.com/1224996"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-11T07:41:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47269"
    },
    {
      "cve": "CVE-2021-47274",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47274"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntracing: Correct the length check which causes memory corruption\n\nWe\u0027ve suffered from severe kernel crashes due to memory corruption on\nour production environment, like,\n\nCall Trace:\n[1640542.554277] general protection fault: 0000 [#1] SMP PTI\n[1640542.554856] CPU: 17 PID: 26996 Comm: python Kdump: loaded Tainted:G\n[1640542.556629] RIP: 0010:kmem_cache_alloc+0x90/0x190\n[1640542.559074] RSP: 0018:ffffb16faa597df8 EFLAGS: 00010286\n[1640542.559587] RAX: 0000000000000000 RBX: 0000000000400200 RCX:\n0000000006e931bf\n[1640542.560323] RDX: 0000000006e931be RSI: 0000000000400200 RDI:\nffff9a45ff004300\n[1640542.560996] RBP: 0000000000400200 R08: 0000000000023420 R09:\n0000000000000000\n[1640542.561670] R10: 0000000000000000 R11: 0000000000000000 R12:\nffffffff9a20608d\n[1640542.562366] R13: ffff9a45ff004300 R14: ffff9a45ff004300 R15:\n696c662f65636976\n[1640542.563128] FS:  00007f45d7c6f740(0000) GS:ffff9a45ff840000(0000)\nknlGS:0000000000000000\n[1640542.563937] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[1640542.564557] CR2: 00007f45d71311a0 CR3: 000000189d63e004 CR4:\n00000000003606e0\n[1640542.565279] DR0: 0000000000000000 DR1: 0000000000000000 DR2:\n0000000000000000\n[1640542.566069] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7:\n0000000000000400\n[1640542.566742] Call Trace:\n[1640542.567009]  anon_vma_clone+0x5d/0x170\n[1640542.567417]  __split_vma+0x91/0x1a0\n[1640542.567777]  do_munmap+0x2c6/0x320\n[1640542.568128]  vm_munmap+0x54/0x70\n[1640542.569990]  __x64_sys_munmap+0x22/0x30\n[1640542.572005]  do_syscall_64+0x5b/0x1b0\n[1640542.573724]  entry_SYSCALL_64_after_hwframe+0x44/0xa9\n[1640542.575642] RIP: 0033:0x7f45d6e61e27\n\nJames Wang has reproduced it stably on the latest 4.19 LTS.\nAfter some debugging, we finally proved that it\u0027s due to ftrace\nbuffer out-of-bound access using a debug tool as follows:\n[   86.775200] BUG: Out-of-bounds write at addr 0xffff88aefe8b7000\n[   86.780806]  no_context+0xdf/0x3c0\n[   86.784327]  __do_page_fault+0x252/0x470\n[   86.788367]  do_page_fault+0x32/0x140\n[   86.792145]  page_fault+0x1e/0x30\n[   86.795576]  strncpy_from_unsafe+0x66/0xb0\n[   86.799789]  fetch_memory_string+0x25/0x40\n[   86.804002]  fetch_deref_string+0x51/0x60\n[   86.808134]  kprobe_trace_func+0x32d/0x3a0\n[   86.812347]  kprobe_dispatcher+0x45/0x50\n[   86.816385]  kprobe_ftrace_handler+0x90/0xf0\n[   86.820779]  ftrace_ops_assist_func+0xa1/0x140\n[   86.825340]  0xffffffffc00750bf\n[   86.828603]  do_sys_open+0x5/0x1f0\n[   86.832124]  do_syscall_64+0x5b/0x1b0\n[   86.835900]  entry_SYSCALL_64_after_hwframe+0x44/0xa9\n\ncommit b220c049d519 (\"tracing: Check length before giving out\nthe filter buffer\") adds length check to protect trace data\noverflow introduced in 0fc1b09ff1ff, seems that this fix can\u0027t prevent\noverflow entirely, the length check should also take the sizeof\nentry-\u003earray[0] into account, since this array[0] is filled the\nlength of trace data and occupy addtional space and risk overflow.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47274",
          "url": "https://www.suse.com/security/cve/CVE-2021-47274"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1224990 for CVE-2021-47274",
          "url": "https://bugzilla.suse.com/1224990"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-11T07:41:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47274"
    },
    {
      "cve": "CVE-2021-47276",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47276"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nftrace: Do not blindly read the ip address in ftrace_bug()\n\nIt was reported that a bug on arm64 caused a bad ip address to be used for\nupdating into a nop in ftrace_init(), but the error path (rightfully)\nreturned -EINVAL and not -EFAULT, as the bug caused more than one error to\noccur. But because -EINVAL was returned, the ftrace_bug() tried to report\nwhat was at the location of the ip address, and read it directly. This\ncaused the machine to panic, as the ip was not pointing to a valid memory\naddress.\n\nInstead, read the ip address with copy_from_kernel_nofault() to safely\naccess the memory, and if it faults, report that the address faulted,\notherwise report what was in that location.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47276",
          "url": "https://www.suse.com/security/cve/CVE-2021-47276"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1224966 for CVE-2021-47276",
          "url": "https://bugzilla.suse.com/1224966"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-11T07:41:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47276"
    },
    {
      "cve": "CVE-2021-47277",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47277"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nkvm: avoid speculation-based attacks from out-of-range memslot accesses\n\nKVM\u0027s mechanism for accessing guest memory translates a guest physical\naddress (gpa) to a host virtual address using the right-shifted gpa\n(also known as gfn) and a struct kvm_memory_slot.  The translation is\nperformed in __gfn_to_hva_memslot using the following formula:\n\n      hva = slot-\u003euserspace_addr + (gfn - slot-\u003ebase_gfn) * PAGE_SIZE\n\nIt is expected that gfn falls within the boundaries of the guest\u0027s\nphysical memory.  However, a guest can access invalid physical addresses\nin such a way that the gfn is invalid.\n\n__gfn_to_hva_memslot is called from kvm_vcpu_gfn_to_hva_prot, which first\nretrieves a memslot through __gfn_to_memslot.  While __gfn_to_memslot\ndoes check that the gfn falls within the boundaries of the guest\u0027s\nphysical memory or not, a CPU can speculate the result of the check and\ncontinue execution speculatively using an illegal gfn. The speculation\ncan result in calculating an out-of-bounds hva.  If the resulting host\nvirtual address is used to load another guest physical address, this\nis effectively a Spectre gadget consisting of two consecutive reads,\nthe second of which is data dependent on the first.\n\nRight now it\u0027s not clear if there are any cases in which this is\nexploitable.  One interesting case was reported by the original author\nof this patch, and involves visiting guest page tables on x86.  Right\nnow these are not vulnerable because the hva read goes through get_user(),\nwhich contains an LFENCE speculation barrier.  However, there are\npatches in progress for x86 uaccess.h to mask kernel addresses instead of\nusing LFENCE; once these land, a guest could use speculation to read\nfrom the VMM\u0027s ring 3 address space.  Other architectures such as ARM\nalready use the address masking method, and would be susceptible to\nthis same kind of data-dependent access gadgets.  Therefore, this patch\nproactively protects from these attacks by masking out-of-bounds gfns\nin __gfn_to_hva_memslot, which blocks speculation of invalid hvas.\n\nSean Christopherson noted that this patch does not cover\nkvm_read_guest_offset_cached.  This however is limited to a few bytes\npast the end of the cache, and therefore it is unlikely to be useful in\nthe context of building a chain of data dependent accesses.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47277",
          "url": "https://www.suse.com/security/cve/CVE-2021-47277"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1224960 for CVE-2021-47277",
          "url": "https://bugzilla.suse.com/1224960"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-11T07:41:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47277"
    },
    {
      "cve": "CVE-2021-47280",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47280"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm: Fix use-after-free read in drm_getunique()\n\nThere is a time-of-check-to-time-of-use error in drm_getunique() due\nto retrieving file_priv-\u003emaster prior to locking the device\u0027s master\nmutex.\n\nAn example can be seen in the crash report of the use-after-free error\nfound by Syzbot:\nhttps://syzkaller.appspot.com/bug?id=148d2f1dfac64af52ffd27b661981a540724f803\n\nIn the report, the master pointer was used after being freed. This is\nbecause another process had acquired the device\u0027s master mutex in\ndrm_setmaster_ioctl(), then overwrote fpriv-\u003emaster in\ndrm_new_set_master(). The old value of fpriv-\u003emaster was subsequently\nfreed before the mutex was unlocked.\n\nTo fix this, we lock the device\u0027s master mutex before retrieving the\npointer from from fpriv-\u003emaster. This patch passes the Syzbot\nreproducer test.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47280",
          "url": "https://www.suse.com/security/cve/CVE-2021-47280"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1224982 for CVE-2021-47280",
          "url": "https://bugzilla.suse.com/1224982"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-11T07:41:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47280"
    },
    {
      "cve": "CVE-2021-47281",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47281"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: seq: Fix race of snd_seq_timer_open()\n\nThe timer instance per queue is exclusive, and snd_seq_timer_open()\nshould have managed the concurrent accesses.  It looks as if it\u0027s\nchecking the already existing timer instance at the beginning, but\nit\u0027s not right, because there is no protection, hence any later\nconcurrent call of snd_seq_timer_open() may override the timer\ninstance easily.  This may result in UAF, as the leftover timer\ninstance can keep running while the queue itself gets closed, as\nspotted by syzkaller recently.\n\nFor avoiding the race, add a proper check at the assignment of\ntmr-\u003etimeri again, and return -EBUSY if it\u0027s been already registered.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47281",
          "url": "https://www.suse.com/security/cve/CVE-2021-47281"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1224983 for CVE-2021-47281",
          "url": "https://bugzilla.suse.com/1224983"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-11T07:41:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47281"
    },
    {
      "cve": "CVE-2021-47284",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47284"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nisdn: mISDN: netjet: Fix crash in nj_probe:\n\n\u0027nj_setup\u0027 in netjet.c might fail with -EIO and in this case\n\u0027card-\u003eirq\u0027 is initialized and is bigger than zero. A subsequent call to\n\u0027nj_release\u0027 will free the irq that has not been requested.\n\nFix this bug by deleting the previous assignment to \u0027card-\u003eirq\u0027 and just\nkeep the assignment before \u0027request_irq\u0027.\n\nThe KASAN\u0027s log reveals it:\n\n[    3.354615 ] WARNING: CPU: 0 PID: 1 at kernel/irq/manage.c:1826\nfree_irq+0x100/0x480\n[    3.355112 ] Modules linked in:\n[    3.355310 ] CPU: 0 PID: 1 Comm: swapper/0 Not tainted\n5.13.0-rc1-00144-g25a1298726e #13\n[    3.355816 ] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS\nrel-1.12.0-59-gc9ba5276e321-prebuilt.qemu.org 04/01/2014\n[    3.356552 ] RIP: 0010:free_irq+0x100/0x480\n[    3.356820 ] Code: 6e 08 74 6f 4d 89 f4 e8 5e ac 09 00 4d 8b 74 24 18\n4d 85 f6 75 e3 e8 4f ac 09 00 8b 75 c8 48 c7 c7 78 c1 2e 85 e8 e0 cf f5\nff \u003c0f\u003e 0b 48 8b 75 c0 4c 89 ff e8 72 33 0b 03 48 8b 43 40 4c 8b a0 80\n[    3.358012 ] RSP: 0000:ffffc90000017b48 EFLAGS: 00010082\n[    3.358357 ] RAX: 0000000000000000 RBX: ffff888104dc8000 RCX:\n0000000000000000\n[    3.358814 ] RDX: ffff8881003c8000 RSI: ffffffff8124a9e6 RDI:\n00000000ffffffff\n[    3.359272 ] RBP: ffffc90000017b88 R08: 0000000000000000 R09:\n0000000000000000\n[    3.359732 ] R10: ffffc900000179f0 R11: 0000000000001d04 R12:\n0000000000000000\n[    3.360195 ] R13: ffff888107dc6000 R14: ffff888107dc6928 R15:\nffff888104dc80a8\n[    3.360652 ] FS:  0000000000000000(0000) GS:ffff88817bc00000(0000)\nknlGS:0000000000000000\n[    3.361170 ] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[    3.361538 ] CR2: 0000000000000000 CR3: 000000000582e000 CR4:\n00000000000006f0\n[    3.362003 ] DR0: 0000000000000000 DR1: 0000000000000000 DR2:\n0000000000000000\n[    3.362175 ] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7:\n0000000000000400\n[    3.362175 ] Call Trace:\n[    3.362175 ]  nj_release+0x51/0x1e0\n[    3.362175 ]  nj_probe+0x450/0x950\n[    3.362175 ]  ? pci_device_remove+0x110/0x110\n[    3.362175 ]  local_pci_probe+0x45/0xa0\n[    3.362175 ]  pci_device_probe+0x12b/0x1d0\n[    3.362175 ]  really_probe+0x2a9/0x610\n[    3.362175 ]  driver_probe_device+0x90/0x1d0\n[    3.362175 ]  ? mutex_lock_nested+0x1b/0x20\n[    3.362175 ]  device_driver_attach+0x68/0x70\n[    3.362175 ]  __driver_attach+0x124/0x1b0\n[    3.362175 ]  ? device_driver_attach+0x70/0x70\n[    3.362175 ]  bus_for_each_dev+0xbb/0x110\n[    3.362175 ]  ? rdinit_setup+0x45/0x45\n[    3.362175 ]  driver_attach+0x27/0x30\n[    3.362175 ]  bus_add_driver+0x1eb/0x2a0\n[    3.362175 ]  driver_register+0xa9/0x180\n[    3.362175 ]  __pci_register_driver+0x82/0x90\n[    3.362175 ]  ? w6692_init+0x38/0x38\n[    3.362175 ]  nj_init+0x36/0x38\n[    3.362175 ]  do_one_initcall+0x7f/0x3d0\n[    3.362175 ]  ? rdinit_setup+0x45/0x45\n[    3.362175 ]  ? rcu_read_lock_sched_held+0x4f/0x80\n[    3.362175 ]  kernel_init_freeable+0x2aa/0x301\n[    3.362175 ]  ? rest_init+0x2c0/0x2c0\n[    3.362175 ]  kernel_init+0x18/0x190\n[    3.362175 ]  ? rest_init+0x2c0/0x2c0\n[    3.362175 ]  ? rest_init+0x2c0/0x2c0\n[    3.362175 ]  ret_from_fork+0x1f/0x30\n[    3.362175 ] Kernel panic - not syncing: panic_on_warn set ...\n[    3.362175 ] CPU: 0 PID: 1 Comm: swapper/0 Not tainted\n5.13.0-rc1-00144-g25a1298726e #13\n[    3.362175 ] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS\nrel-1.12.0-59-gc9ba5276e321-prebuilt.qemu.org 04/01/2014\n[    3.362175 ] Call Trace:\n[    3.362175 ]  dump_stack+0xba/0xf5\n[    3.362175 ]  ? free_irq+0x100/0x480\n[    3.362175 ]  panic+0x15a/0x3f2\n[    3.362175 ]  ? __warn+0xf2/0x150\n[    3.362175 ]  ? free_irq+0x100/0x480\n[    3.362175 ]  __warn+0x108/0x150\n[    3.362175 ]  ? free_irq+0x100/0x480\n[    3.362175 ]  report_bug+0x119/0x1c0\n[    3.362175 ]  handle_bug+0x3b/0x80\n[    3.362175 ]  exc_invalid_op+0x18/0x70\n[    3.362175 ]  asm_exc_invalid_op+0x12/0x20\n[    3.362175 ] RIP: 0010:free_irq+0x100\n---truncated---",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47284",
          "url": "https://www.suse.com/security/cve/CVE-2021-47284"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1224987 for CVE-2021-47284",
          "url": "https://bugzilla.suse.com/1224987"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-11T07:41:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47284"
    },
    {
      "cve": "CVE-2021-47285",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47285"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47285",
          "url": "https://www.suse.com/security/cve/CVE-2021-47285"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1224981 for CVE-2021-47285",
          "url": "https://bugzilla.suse.com/1224981"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 0,
            "baseSeverity": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-11T07:41:39Z",
          "details": "low"
        }
      ],
      "title": "CVE-2021-47285"
    },
    {
      "cve": "CVE-2021-47288",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47288"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: ngene: Fix out-of-bounds bug in ngene_command_config_free_buf()\n\nFix an 11-year old bug in ngene_command_config_free_buf() while\naddressing the following warnings caught with -Warray-bounds:\n\narch/alpha/include/asm/string.h:22:16: warning: \u0027__builtin_memcpy\u0027 offset [12, 16] from the object at \u0027com\u0027 is out of the bounds of referenced subobject \u0027config\u0027 with type \u0027unsigned char\u0027 at offset 10 [-Warray-bounds]\narch/x86/include/asm/string_32.h:182:25: warning: \u0027__builtin_memcpy\u0027 offset [12, 16] from the object at \u0027com\u0027 is out of the bounds of referenced subobject \u0027config\u0027 with type \u0027unsigned char\u0027 at offset 10 [-Warray-bounds]\n\nThe problem is that the original code is trying to copy 6 bytes of\ndata into a one-byte size member _config_ of the wrong structue\nFW_CONFIGURE_BUFFERS, in a single call to memcpy(). This causes a\nlegitimate compiler warning because memcpy() overruns the length\nof \u0026com.cmd.ConfigureBuffers.config. It seems that the right\nstructure is FW_CONFIGURE_FREE_BUFFERS, instead, because it contains\n6 more members apart from the header _hdr_. Also, the name of\nthe function ngene_command_config_free_buf() suggests that the actual\nintention is to ConfigureFreeBuffers, instead of ConfigureBuffers\n(which takes place in the function ngene_command_config_buf(), above).\n\nFix this by enclosing those 6 members of struct FW_CONFIGURE_FREE_BUFFERS\ninto new struct config, and use \u0026com.cmd.ConfigureFreeBuffers.config as\nthe destination address, instead of \u0026com.cmd.ConfigureBuffers.config,\nwhen calling memcpy().\n\nThis also helps with the ongoing efforts to globally enable\n-Warray-bounds and get us closer to being able to tighten the\nFORTIFY_SOURCE routines on memcpy().",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47288",
          "url": "https://www.suse.com/security/cve/CVE-2021-47288"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1224889 for CVE-2021-47288",
          "url": "https://bugzilla.suse.com/1224889"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-11T07:41:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47288"
    },
    {
      "cve": "CVE-2021-47301",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47301"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nigb: Fix use-after-free error during reset\n\nCleans the next descriptor to watch (next_to_watch) when cleaning the\nTX ring.\n\nFailure to do so can cause invalid memory accesses. If igb_poll() runs\nwhile the controller is reset this can lead to the driver try to free\na skb that was already freed.\n\n(The crash is harder to reproduce with the igb driver, but the same\npotential problem exists as the code is identical to igc)",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47301",
          "url": "https://www.suse.com/security/cve/CVE-2021-47301"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1224916 for CVE-2021-47301",
          "url": "https://bugzilla.suse.com/1224916"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-11T07:41:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47301"
    },
    {
      "cve": "CVE-2021-47302",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47302"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nigc: Fix use-after-free error during reset\n\nCleans the next descriptor to watch (next_to_watch) when cleaning the\nTX ring.\n\nFailure to do so can cause invalid memory accesses. If igc_poll() runs\nwhile the controller is being reset this can lead to the driver try to\nfree a skb that was already freed.\n\nLog message:\n\n [  101.525242] refcount_t: underflow; use-after-free.\n [  101.525251] WARNING: CPU: 1 PID: 646 at lib/refcount.c:28 refcount_warn_saturate+0xab/0xf0\n [  101.525259] Modules linked in: sch_etf(E) sch_mqprio(E) rfkill(E) intel_rapl_msr(E) intel_rapl_common(E)\n x86_pkg_temp_thermal(E) intel_powerclamp(E) coretemp(E) binfmt_misc(E) kvm_intel(E) kvm(E) irqbypass(E) crc32_pclmul(E)\n ghash_clmulni_intel(E) aesni_intel(E) mei_wdt(E) libaes(E) crypto_simd(E) cryptd(E) glue_helper(E) snd_hda_codec_hdmi(E)\n rapl(E) intel_cstate(E) snd_hda_intel(E) snd_intel_dspcfg(E) sg(E) soundwire_intel(E) intel_uncore(E) at24(E)\n soundwire_generic_allocation(E) iTCO_wdt(E) soundwire_cadence(E) intel_pmc_bxt(E) serio_raw(E) snd_hda_codec(E)\n iTCO_vendor_support(E) watchdog(E) snd_hda_core(E) snd_hwdep(E) snd_soc_core(E) snd_compress(E) snd_pcsp(E)\n soundwire_bus(E) snd_pcm(E) evdev(E) snd_timer(E) mei_me(E) snd(E) soundcore(E) mei(E) configfs(E) ip_tables(E) x_tables(E)\n autofs4(E) ext4(E) crc32c_generic(E) crc16(E) mbcache(E) jbd2(E) sd_mod(E) t10_pi(E) crc_t10dif(E) crct10dif_generic(E)\n i915(E) ahci(E) libahci(E) ehci_pci(E) igb(E) xhci_pci(E) ehci_hcd(E)\n [  101.525303]  drm_kms_helper(E) dca(E) xhci_hcd(E) libata(E) crct10dif_pclmul(E) cec(E) crct10dif_common(E) tsn(E) igc(E)\n e1000e(E) ptp(E) i2c_i801(E) crc32c_intel(E) psmouse(E) i2c_algo_bit(E) i2c_smbus(E) scsi_mod(E) lpc_ich(E) pps_core(E)\n usbcore(E) drm(E) button(E) video(E)\n [  101.525318] CPU: 1 PID: 646 Comm: irq/37-enp7s0-T Tainted: G            E     5.10.30-rt37-tsn1-rt-ipipe #ipipe\n [  101.525320] Hardware name: SIEMENS AG SIMATIC IPC427D/A5E31233588, BIOS V17.02.09 03/31/2017\n [  101.525322] RIP: 0010:refcount_warn_saturate+0xab/0xf0\n [  101.525325] Code: 05 31 48 44 01 01 e8 f0 c6 42 00 0f 0b c3 80 3d 1f 48 44 01 00 75 90 48 c7 c7 78 a8 f3 a6 c6 05 0f 48\n 44 01 01 e8 d1 c6 42 00 \u003c0f\u003e 0b c3 80 3d fe 47 44 01 00 0f 85 6d ff ff ff 48 c7 c7 d0 a8 f3\n [  101.525327] RSP: 0018:ffffbdedc0917cb8 EFLAGS: 00010286\n [  101.525329] RAX: 0000000000000000 RBX: ffff98fd6becbf40 RCX: 0000000000000001\n [  101.525330] RDX: 0000000000000001 RSI: ffffffffa6f2700c RDI: 00000000ffffffff\n [  101.525332] RBP: ffff98fd6becc14c R08: ffffffffa7463d00 R09: ffffbdedc0917c50\n [  101.525333] R10: ffffffffa74c3578 R11: 0000000000000034 R12: 00000000ffffff00\n [  101.525335] R13: ffff98fd6b0b1000 R14: 0000000000000039 R15: ffff98fd6be35c40\n [  101.525337] FS:  0000000000000000(0000) GS:ffff98fd6e240000(0000) knlGS:0000000000000000\n [  101.525339] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n [  101.525341] CR2: 00007f34135a3a70 CR3: 0000000150210003 CR4: 00000000001706e0\n [  101.525343] Call Trace:\n [  101.525346]  sock_wfree+0x9c/0xa0\n [  101.525353]  unix_destruct_scm+0x7b/0xa0\n [  101.525358]  skb_release_head_state+0x40/0x90\n [  101.525362]  skb_release_all+0xe/0x30\n [  101.525364]  napi_consume_skb+0x57/0x160\n [  101.525367]  igc_poll+0xb7/0xc80 [igc]\n [  101.525376]  ? sched_clock+0x5/0x10\n [  101.525381]  ? sched_clock_cpu+0xe/0x100\n [  101.525385]  net_rx_action+0x14c/0x410\n [  101.525388]  __do_softirq+0xe9/0x2f4\n [  101.525391]  __local_bh_enable_ip+0xe3/0x110\n [  101.525395]  ? irq_finalize_oneshot.part.47+0xe0/0xe0\n [  101.525398]  irq_forced_thread_fn+0x6a/0x80\n [  101.525401]  irq_thread+0xe8/0x180\n [  101.525403]  ? wake_threads_waitq+0x30/0x30\n [  101.525406]  ? irq_thread_check_affinity+0xd0/0xd0\n [  101.525408]  kthread+0x183/0x1a0\n [  101.525412]  ? kthread_park+0x80/0x80\n [  101.525415]  ret_from_fork+0x22/0x30",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47302",
          "url": "https://www.suse.com/security/cve/CVE-2021-47302"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1224917 for CVE-2021-47302",
          "url": "https://bugzilla.suse.com/1224917"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-11T07:41:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47302"
    },
    {
      "cve": "CVE-2021-47305",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47305"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndma-buf/sync_file: Don\u0027t leak fences on merge failure\n\nEach add_fence() call does a dma_fence_get() on the relevant fence.  In\nthe error path, we weren\u0027t calling dma_fence_put() so all those fences\ngot leaked.  Also, in the krealloc_array failure case, we weren\u0027t\nfreeing the fences array.  Instead, ensure that i and fences are always\nzero-initialized and dma_fence_put() all the fences and kfree(fences) on\nevery error path.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47305",
          "url": "https://www.suse.com/security/cve/CVE-2021-47305"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1224968 for CVE-2021-47305",
          "url": "https://bugzilla.suse.com/1224968"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-11T07:41:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47305"
    },
    {
      "cve": "CVE-2021-47307",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47307"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncifs: prevent NULL deref in cifs_compose_mount_options()\n\nThe optional @ref parameter might contain an NULL node_name, so\nprevent dereferencing it in cifs_compose_mount_options().\n\nAddresses-Coverity: 1476408 (\"Explicit null dereferenced\")",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47307",
          "url": "https://www.suse.com/security/cve/CVE-2021-47307"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1224961 for CVE-2021-47307",
          "url": "https://bugzilla.suse.com/1224961"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-11T07:41:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47307"
    },
    {
      "cve": "CVE-2021-47308",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47308"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: libfc: Fix array index out of bound exception\n\nFix array index out of bound exception in fc_rport_prli_resp().",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47308",
          "url": "https://www.suse.com/security/cve/CVE-2021-47308"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1224963 for CVE-2021-47308",
          "url": "https://bugzilla.suse.com/1224963"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-11T07:41:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47308"
    },
    {
      "cve": "CVE-2021-47310",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47310"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: ti: fix UAF in tlan_remove_one\n\npriv is netdev private data and it cannot be\nused after free_netdev() call. Using priv after free_netdev()\ncan cause UAF bug. Fix it by moving free_netdev() at the end of the\nfunction.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47310",
          "url": "https://www.suse.com/security/cve/CVE-2021-47310"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1224959 for CVE-2021-47310",
          "url": "https://bugzilla.suse.com/1224959"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-11T07:41:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47310"
    },
    {
      "cve": "CVE-2021-47311",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47311"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: qcom/emac: fix UAF in emac_remove\n\nadpt is netdev private data and it cannot be\nused after free_netdev() call. Using adpt after free_netdev()\ncan cause UAF bug. Fix it by moving free_netdev() at the end of the\nfunction.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47311",
          "url": "https://www.suse.com/security/cve/CVE-2021-47311"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1225010 for CVE-2021-47311",
          "url": "https://bugzilla.suse.com/1225010"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1227752 for CVE-2021-47311",
          "url": "https://bugzilla.suse.com/1227752"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-11T07:41:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47311"
    },
    {
      "cve": "CVE-2021-47314",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47314"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmemory: fsl_ifc: fix leak of private memory on probe failure\n\nOn probe error the driver should free the memory allocated for private\nstructure.  Fix this by using resource-managed allocation.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47314",
          "url": "https://www.suse.com/security/cve/CVE-2021-47314"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1224893 for CVE-2021-47314",
          "url": "https://bugzilla.suse.com/1224893"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-11T07:41:39Z",
          "details": "low"
        }
      ],
      "title": "CVE-2021-47314"
    },
    {
      "cve": "CVE-2021-47315",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47315"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmemory: fsl_ifc: fix leak of IO mapping on probe failure\n\nOn probe error the driver should unmap the IO memory.  Smatch reports:\n\n  drivers/memory/fsl_ifc.c:298 fsl_ifc_ctrl_probe() warn: \u0027fsl_ifc_ctrl_dev-\u003egregs\u0027 not released on lines: 298.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47315",
          "url": "https://www.suse.com/security/cve/CVE-2021-47315"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1224892 for CVE-2021-47315",
          "url": "https://bugzilla.suse.com/1224892"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-11T07:41:39Z",
          "details": "low"
        }
      ],
      "title": "CVE-2021-47315"
    },
    {
      "cve": "CVE-2021-47319",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47319"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvirtio-blk: Fix memory leak among suspend/resume procedure\n\nThe vblk-\u003evqs should be freed before we call init_vqs()\nin virtblk_restore().",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47319",
          "url": "https://www.suse.com/security/cve/CVE-2021-47319"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1225054 for CVE-2021-47319",
          "url": "https://bugzilla.suse.com/1225054"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-11T07:41:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47319"
    },
    {
      "cve": "CVE-2021-47320",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47320"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnfs: fix acl memory leak of posix_acl_create()\n\nWhen looking into another nfs xfstests report, I found acl and\ndefault_acl in nfs3_proc_create() and nfs3_proc_mknod() error\npaths are possibly leaked. Fix them in advance.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47320",
          "url": "https://www.suse.com/security/cve/CVE-2021-47320"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1225058 for CVE-2021-47320",
          "url": "https://bugzilla.suse.com/1225058"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-11T07:41:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47320"
    },
    {
      "cve": "CVE-2021-47321",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47321"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwatchdog: Fix possible use-after-free by calling del_timer_sync()\n\nThis driver\u0027s remove path calls del_timer(). However, that function\ndoes not wait until the timer handler finishes. This means that the\ntimer handler may still be running after the driver\u0027s remove function\nhas finished, which would result in a use-after-free.\n\nFix by calling del_timer_sync(), which makes sure the timer handler\nhas finished, and unable to re-schedule itself.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47321",
          "url": "https://www.suse.com/security/cve/CVE-2021-47321"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1225060 for CVE-2021-47321",
          "url": "https://bugzilla.suse.com/1225060"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-11T07:41:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47321"
    },
    {
      "cve": "CVE-2021-47323",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47323"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwatchdog: sc520_wdt: Fix possible use-after-free in wdt_turnoff()\n\nThis module\u0027s remove path calls del_timer(). However, that function\ndoes not wait until the timer handler finishes. This means that the\ntimer handler may still be running after the driver\u0027s remove function\nhas finished, which would result in a use-after-free.\n\nFix by calling del_timer_sync(), which makes sure the timer handler\nhas finished, and unable to re-schedule itself.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47323",
          "url": "https://www.suse.com/security/cve/CVE-2021-47323"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1225026 for CVE-2021-47323",
          "url": "https://bugzilla.suse.com/1225026"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1227557 for CVE-2021-47323",
          "url": "https://bugzilla.suse.com/1227557"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-11T07:41:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47323"
    },
    {
      "cve": "CVE-2021-47324",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47324"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwatchdog: Fix possible use-after-free in wdt_startup()\n\nThis module\u0027s remove path calls del_timer(). However, that function\ndoes not wait until the timer handler finishes. This means that the\ntimer handler may still be running after the driver\u0027s remove function\nhas finished, which would result in a use-after-free.\n\nFix by calling del_timer_sync(), which makes sure the timer handler\nhas finished, and unable to re-schedule itself.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47324",
          "url": "https://www.suse.com/security/cve/CVE-2021-47324"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1225030 for CVE-2021-47324",
          "url": "https://bugzilla.suse.com/1225030"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1225038 for CVE-2021-47324",
          "url": "https://bugzilla.suse.com/1225038"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-11T07:41:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47324"
    },
    {
      "cve": "CVE-2021-47330",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47330"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntty: serial: 8250: serial_cs: Fix a memory leak in error handling path\n\nIn the probe function, if the final \u0027serial_config()\u0027 fails, \u0027info\u0027 is\nleaking.\n\nAdd a resource handling path to free this memory.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47330",
          "url": "https://www.suse.com/security/cve/CVE-2021-47330"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1225084 for CVE-2021-47330",
          "url": "https://bugzilla.suse.com/1225084"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-11T07:41:39Z",
          "details": "low"
        }
      ],
      "title": "CVE-2021-47330"
    },
    {
      "cve": "CVE-2021-47334",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47334"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmisc/libmasm/module: Fix two use after free in ibmasm_init_one\n\nIn ibmasm_init_one, it calls ibmasm_init_remote_input_dev().\nInside ibmasm_init_remote_input_dev, mouse_dev and keybd_dev are\nallocated by input_allocate_device(), and assigned to\nsp-\u003eremote.mouse_dev and sp-\u003eremote.keybd_dev respectively.\n\nIn the err_free_devices error branch of ibmasm_init_one,\nmouse_dev and keybd_dev are freed by input_free_device(), and return\nerror. Then the execution runs into error_send_message error branch\nof ibmasm_init_one, where ibmasm_free_remote_input_dev(sp) is called\nto unregister the freed sp-\u003eremote.mouse_dev and sp-\u003eremote.keybd_dev.\n\nMy patch add a \"error_init_remote\" label to handle the error of\nibmasm_init_remote_input_dev(), to avoid the uaf bugs.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47334",
          "url": "https://www.suse.com/security/cve/CVE-2021-47334"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1225112 for CVE-2021-47334",
          "url": "https://bugzilla.suse.com/1225112"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.6,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-11T07:41:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47334"
    },
    {
      "cve": "CVE-2021-47337",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47337"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: core: Fix bad pointer dereference when ehandler kthread is invalid\n\nCommit 66a834d09293 (\"scsi: core: Fix error handling of scsi_host_alloc()\")\nchanged the allocation logic to call put_device() to perform host cleanup\nwith the assumption that IDA removal and stopping the kthread would\nproperly be performed in scsi_host_dev_release(). However, in the unlikely\ncase that the error handler thread fails to spawn, shost-\u003eehandler is set\nto ERR_PTR(-ENOMEM).\n\nThe error handler cleanup code in scsi_host_dev_release() will call\nkthread_stop() if shost-\u003eehandler != NULL which will always be the case\nwhether the kthread was successfully spawned or not. In the case that it\nfailed to spawn this has the nasty side effect of trying to dereference an\ninvalid pointer when kthread_stop() is called. The following splat provides\nan example of this behavior in the wild:\n\nscsi host11: error handler thread failed to spawn, error = -4\nKernel attempted to read user page (10c) - exploit attempt? (uid: 0)\nBUG: Kernel NULL pointer dereference on read at 0x0000010c\nFaulting instruction address: 0xc00000000818e9a8\nOops: Kernel access of bad area, sig: 11 [#1]\nLE PAGE_SIZE=64K MMU=Hash SMP NR_CPUS=2048 NUMA pSeries\nModules linked in: ibmvscsi(+) scsi_transport_srp dm_multipath dm_mirror dm_region\n hash dm_log dm_mod fuse overlay squashfs loop\nCPU: 12 PID: 274 Comm: systemd-udevd Not tainted 5.13.0-rc7 #1\nNIP:  c00000000818e9a8 LR: c0000000089846e8 CTR: 0000000000007ee8\nREGS: c000000037d12ea0 TRAP: 0300   Not tainted  (5.13.0-rc7)\nMSR:  800000000280b033 \u0026lt;SF,VEC,VSX,EE,FP,ME,IR,DR,RI,LE\u0026gt;  CR: 28228228\nXER: 20040001\nCFAR: c0000000089846e4 DAR: 000000000000010c DSISR: 40000000 IRQMASK: 0\nGPR00: c0000000089846e8 c000000037d13140 c000000009cc1100 fffffffffffffffc\nGPR04: 0000000000000001 0000000000000000 0000000000000000 c000000037dc0000\nGPR08: 0000000000000000 c000000037dc0000 0000000000000001 00000000fffff7ff\nGPR12: 0000000000008000 c00000000a049000 c000000037d13d00 000000011134d5a0\nGPR16: 0000000000001740 c0080000190d0000 c0080000190d1740 c000000009129288\nGPR20: c000000037d13bc0 0000000000000001 c000000037d13bc0 c0080000190b7898\nGPR24: c0080000190b7708 0000000000000000 c000000033bb2c48 0000000000000000\nGPR28: c000000046b28280 0000000000000000 000000000000010c fffffffffffffffc\nNIP [c00000000818e9a8] kthread_stop+0x38/0x230\nLR [c0000000089846e8] scsi_host_dev_release+0x98/0x160\nCall Trace:\n[c000000033bb2c48] 0xc000000033bb2c48 (unreliable)\n[c0000000089846e8] scsi_host_dev_release+0x98/0x160\n[c00000000891e960] device_release+0x60/0x100\n[c0000000087e55c4] kobject_release+0x84/0x210\n[c00000000891ec78] put_device+0x28/0x40\n[c000000008984ea4] scsi_host_alloc+0x314/0x430\n[c0080000190b38bc] ibmvscsi_probe+0x54/0xad0 [ibmvscsi]\n[c000000008110104] vio_bus_probe+0xa4/0x4b0\n[c00000000892a860] really_probe+0x140/0x680\n[c00000000892aefc] driver_probe_device+0x15c/0x200\n[c00000000892b63c] device_driver_attach+0xcc/0xe0\n[c00000000892b740] __driver_attach+0xf0/0x200\n[c000000008926f28] bus_for_each_dev+0xa8/0x130\n[c000000008929ce4] driver_attach+0x34/0x50\n[c000000008928fc0] bus_add_driver+0x1b0/0x300\n[c00000000892c798] driver_register+0x98/0x1a0\n[c00000000810eb60] __vio_register_driver+0x80/0xe0\n[c0080000190b4a30] ibmvscsi_module_init+0x9c/0xdc [ibmvscsi]\n[c0000000080121d0] do_one_initcall+0x60/0x2d0\n[c000000008261abc] do_init_module+0x7c/0x320\n[c000000008265700] load_module+0x2350/0x25b0\n[c000000008265cb4] __do_sys_finit_module+0xd4/0x160\n[c000000008031110] system_call_exception+0x150/0x2d0\n[c00000000800d35c] system_call_common+0xec/0x278\n\nFix this be nulling shost-\u003eehandler when the kthread fails to spawn.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47337",
          "url": "https://www.suse.com/security/cve/CVE-2021-47337"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1224926 for CVE-2021-47337",
          "url": "https://bugzilla.suse.com/1224926"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-11T07:41:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47337"
    },
    {
      "cve": "CVE-2021-47343",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47343"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndm btree remove: assign new_root only when removal succeeds\n\nremove_raw() in dm_btree_remove() may fail due to IO read error\n(e.g. read the content of origin block fails during shadowing),\nand the value of shadow_spine::root is uninitialized, but\nthe uninitialized value is still assign to new_root in the\nend of dm_btree_remove().\n\nFor dm-thin, the value of pmd-\u003edetails_root or pmd-\u003eroot will become\nan uninitialized value, so if trying to read details_info tree again\nout-of-bound memory may occur as showed below:\n\n  general protection fault, probably for non-canonical address 0x3fdcb14c8d7520\n  CPU: 4 PID: 515 Comm: dmsetup Not tainted 5.13.0-rc6\n  Hardware name: QEMU Standard PC\n  RIP: 0010:metadata_ll_load_ie+0x14/0x30\n  Call Trace:\n   sm_metadata_count_is_more_than_one+0xb9/0xe0\n   dm_tm_shadow_block+0x52/0x1c0\n   shadow_step+0x59/0xf0\n   remove_raw+0xb2/0x170\n   dm_btree_remove+0xf4/0x1c0\n   dm_pool_delete_thin_device+0xc3/0x140\n   pool_message+0x218/0x2b0\n   target_message+0x251/0x290\n   ctl_ioctl+0x1c4/0x4d0\n   dm_ctl_ioctl+0xe/0x20\n   __x64_sys_ioctl+0x7b/0xb0\n   do_syscall_64+0x40/0xb0\n   entry_SYSCALL_64_after_hwframe+0x44/0xae\n\nFixing it by only assign new_root when removal succeeds",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47343",
          "url": "https://www.suse.com/security/cve/CVE-2021-47343"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1225155 for CVE-2021-47343",
          "url": "https://bugzilla.suse.com/1225155"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-11T07:41:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47343"
    },
    {
      "cve": "CVE-2021-47344",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47344"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: zr364xx: fix memory leak in zr364xx_start_readpipe\n\nsyzbot reported memory leak in zr364xx driver.\nThe problem was in non-freed urb in case of\nusb_submit_urb() fail.\n\nbacktrace:\n  [\u003cffffffff82baedf6\u003e] kmalloc include/linux/slab.h:561 [inline]\n  [\u003cffffffff82baedf6\u003e] usb_alloc_urb+0x66/0xe0 drivers/usb/core/urb.c:74\n  [\u003cffffffff82f7cce8\u003e] zr364xx_start_readpipe+0x78/0x130 drivers/media/usb/zr364xx/zr364xx.c:1022\n  [\u003cffffffff84251dfc\u003e] zr364xx_board_init drivers/media/usb/zr364xx/zr364xx.c:1383 [inline]\n  [\u003cffffffff84251dfc\u003e] zr364xx_probe+0x6a3/0x851 drivers/media/usb/zr364xx/zr364xx.c:1516\n  [\u003cffffffff82bb6507\u003e] usb_probe_interface+0x177/0x370 drivers/usb/core/driver.c:396\n  [\u003cffffffff826018a9\u003e] really_probe+0x159/0x500 drivers/base/dd.c:576",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47344",
          "url": "https://www.suse.com/security/cve/CVE-2021-47344"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1224922 for CVE-2021-47344",
          "url": "https://bugzilla.suse.com/1224922"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-11T07:41:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47344"
    },
    {
      "cve": "CVE-2021-47345",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47345"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/cma: Fix rdma_resolve_route() memory leak\n\nFix a memory leak when \"mda_resolve_route() is called more than once on\nthe same \"rdma_cm_id\".\n\nThis is possible if cma_query_handler() triggers the\nRDMA_CM_EVENT_ROUTE_ERROR flow which puts the state machine back and\nallows rdma_resolve_route() to be called again.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47345",
          "url": "https://www.suse.com/security/cve/CVE-2021-47345"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1225157 for CVE-2021-47345",
          "url": "https://bugzilla.suse.com/1225157"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-11T07:41:39Z",
          "details": "low"
        }
      ],
      "title": "CVE-2021-47345"
    },
    {
      "cve": "CVE-2021-47347",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47347"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwl1251: Fix possible buffer overflow in wl1251_cmd_scan\n\nFunction wl1251_cmd_scan calls memcpy without checking the length.\nHarden by checking the length is within the maximum allowed size.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47347",
          "url": "https://www.suse.com/security/cve/CVE-2021-47347"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1225177 for CVE-2021-47347",
          "url": "https://bugzilla.suse.com/1225177"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1225305 for CVE-2021-47347",
          "url": "https://bugzilla.suse.com/1225305"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-11T07:41:39Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-47347"
    },
    {
      "cve": "CVE-2021-47352",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47352"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvirtio-net: Add validation for used length\n\nThis adds validation for used length (might come\nfrom an untrusted device) to avoid data corruption\nor loss.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47352",
          "url": "https://www.suse.com/security/cve/CVE-2021-47352"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1225124 for CVE-2021-47352",
          "url": "https://bugzilla.suse.com/1225124"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-11T07:41:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47352"
    },
    {
      "cve": "CVE-2021-47353",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47353"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nudf: Fix NULL pointer dereference in udf_symlink function\n\nIn function udf_symlink, epos.bh is assigned with the value returned\nby udf_tgetblk. The function udf_tgetblk is defined in udf/misc.c\nand returns the value of sb_getblk function that could be NULL.\nThen, epos.bh is used without any check, causing a possible\nNULL pointer dereference when sb_getblk fails.\n\nThis fix adds a check to validate the value of epos.bh.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47353",
          "url": "https://www.suse.com/security/cve/CVE-2021-47353"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1225128 for CVE-2021-47353",
          "url": "https://bugzilla.suse.com/1225128"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-11T07:41:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47353"
    },
    {
      "cve": "CVE-2021-47355",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47355"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\natm: nicstar: Fix possible use-after-free in nicstar_cleanup()\n\nThis module\u0027s remove path calls del_timer(). However, that function\ndoes not wait until the timer handler finishes. This means that the\ntimer handler may still be running after the driver\u0027s remove function\nhas finished, which would result in a use-after-free.\n\nFix by calling del_timer_sync(), which makes sure the timer handler\nhas finished, and unable to re-schedule itself.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47355",
          "url": "https://www.suse.com/security/cve/CVE-2021-47355"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1225141 for CVE-2021-47355",
          "url": "https://bugzilla.suse.com/1225141"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-11T07:41:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47355"
    },
    {
      "cve": "CVE-2021-47356",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47356"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmISDN: fix possible use-after-free in HFC_cleanup()\n\nThis module\u0027s remove path calls del_timer(). However, that function\ndoes not wait until the timer handler finishes. This means that the\ntimer handler may still be running after the driver\u0027s remove function\nhas finished, which would result in a use-after-free.\n\nFix by calling del_timer_sync(), which makes sure the timer handler\nhas finished, and unable to re-schedule itself.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47356",
          "url": "https://www.suse.com/security/cve/CVE-2021-47356"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1225143 for CVE-2021-47356",
          "url": "https://bugzilla.suse.com/1225143"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.8,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-11T07:41:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47356"
    },
    {
      "cve": "CVE-2021-47357",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47357"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\natm: iphase: fix possible use-after-free in ia_module_exit()\n\nThis module\u0027s remove path calls del_timer(). However, that function\ndoes not wait until the timer handler finishes. This means that the\ntimer handler may still be running after the driver\u0027s remove function\nhas finished, which would result in a use-after-free.\n\nFix by calling del_timer_sync(), which makes sure the timer handler\nhas finished, and unable to re-schedule itself.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47357",
          "url": "https://www.suse.com/security/cve/CVE-2021-47357"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1225144 for CVE-2021-47357",
          "url": "https://bugzilla.suse.com/1225144"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-11T07:41:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47357"
    },
    {
      "cve": "CVE-2021-47361",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47361"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmcb: fix error handling in mcb_alloc_bus()\n\nThere are two bugs:\n1) If ida_simple_get() fails then this code calls put_device(carrier)\n   but we haven\u0027t yet called get_device(carrier) and probably that\n   leads to a use after free.\n2) After device_initialize() then we need to use put_device() to\n   release the bus.  This will free the internal resources tied to the\n   device and call mcb_free_bus() which will free the rest.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47361",
          "url": "https://www.suse.com/security/cve/CVE-2021-47361"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1225151 for CVE-2021-47361",
          "url": "https://bugzilla.suse.com/1225151"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.8,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-11T07:41:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47361"
    },
    {
      "cve": "CVE-2021-47362",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47362"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/pm: Update intermediate power state for SI\n\nUpdate the current state as boot state during dpm initialization.\nDuring the subsequent initialization, set_power_state gets called to\ntransition to the final power state. set_power_state refers to values\nfrom the current state and without current state populated, it could\nresult in NULL pointer dereference.\n\nFor ex: on platforms where PCI speed change is supported through ACPI\nATCS method, the link speed of current state needs to be queried before\ndeciding on changing to final power state\u0027s link speed. The logic to query\nATCS-support was broken on certain platforms. The issue became visible\nwhen broken ATCS-support logic got fixed with commit\nf9b7f3703ff9 (\"drm/amdgpu/acpi: make ATPX/ATCS structures global (v2)\").\n\nBug: https://gitlab.freedesktop.org/drm/amd/-/issues/1698",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47362",
          "url": "https://www.suse.com/security/cve/CVE-2021-47362"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1225153 for CVE-2021-47362",
          "url": "https://bugzilla.suse.com/1225153"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-11T07:41:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47362"
    },
    {
      "cve": "CVE-2021-47369",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47369"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ns390/qeth: fix NULL deref in qeth_clear_working_pool_list()\n\nWhen qeth_set_online() calls qeth_clear_working_pool_list() to roll\nback after an error exit from qeth_hardsetup_card(), we are at risk of\naccessing card-\u003eqdio.in_q before it was allocated by\nqeth_alloc_qdio_queues() via qeth_mpc_initialize().\n\nqeth_clear_working_pool_list() then dereferences NULL, and by writing to\nqueue-\u003ebufs[i].pool_entry scribbles all over the CPU\u0027s lowcore.\nResulting in a crash when those lowcore areas are used next (eg. on\nthe next machine-check interrupt).\n\nSuch a scenario would typically happen when the device is first set\nonline and its queues aren\u0027t allocated yet. An early IO error or certain\nmisconfigs (eg. mismatched transport mode, bad portno) then cause us to\nerror out from qeth_hardsetup_card() with card-\u003eqdio.in_q still being\nNULL.\n\nFix it by checking the pointer for NULL before accessing it.\n\nNote that we also have (rare) paths inside qeth_mpc_initialize() where\na configuration change can cause us to free the existing queues,\nexpecting that subsequent code will allocate them again. If we then\nerror out before that re-allocation happens, the same bug occurs.\n\nRoot-caused-by: Heiko Carstens \u003chca@linux.ibm.com\u003e",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47369",
          "url": "https://www.suse.com/security/cve/CVE-2021-47369"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1225164 for CVE-2021-47369",
          "url": "https://bugzilla.suse.com/1225164"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1227324 for CVE-2021-47369",
          "url": "https://bugzilla.suse.com/1227324"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-11T07:41:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47369"
    },
    {
      "cve": "CVE-2021-47375",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47375"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nblktrace: Fix uaf in blk_trace access after removing by sysfs\n\nThere is an use-after-free problem triggered by following process:\n\n      P1(sda)\t\t\t\tP2(sdb)\n\t\t\techo 0 \u003e /sys/block/sdb/trace/enable\n\t\t\t  blk_trace_remove_queue\n\t\t\t    synchronize_rcu\n\t\t\t    blk_trace_free\n\t\t\t      relay_close\nrcu_read_lock\n__blk_add_trace\n  trace_note_tsk\n  (Iterate running_trace_list)\n\t\t\t        relay_close_buf\n\t\t\t\t  relay_destroy_buf\n\t\t\t\t    kfree(buf)\n    trace_note(sdb\u0027s bt)\n      relay_reserve\n        buf-\u003eoffset \u003c- nullptr deference (use-after-free) !!!\nrcu_read_unlock\n\n[  502.714379] BUG: kernel NULL pointer dereference, address:\n0000000000000010\n[  502.715260] #PF: supervisor read access in kernel mode\n[  502.715903] #PF: error_code(0x0000) - not-present page\n[  502.716546] PGD 103984067 P4D 103984067 PUD 17592b067 PMD 0\n[  502.717252] Oops: 0000 [#1] SMP\n[  502.720308] RIP: 0010:trace_note.isra.0+0x86/0x360\n[  502.732872] Call Trace:\n[  502.733193]  __blk_add_trace.cold+0x137/0x1a3\n[  502.733734]  blk_add_trace_rq+0x7b/0xd0\n[  502.734207]  blk_add_trace_rq_issue+0x54/0xa0\n[  502.734755]  blk_mq_start_request+0xde/0x1b0\n[  502.735287]  scsi_queue_rq+0x528/0x1140\n...\n[  502.742704]  sg_new_write.isra.0+0x16e/0x3e0\n[  502.747501]  sg_ioctl+0x466/0x1100\n\nReproduce method:\n  ioctl(/dev/sda, BLKTRACESETUP, blk_user_trace_setup[buf_size=127])\n  ioctl(/dev/sda, BLKTRACESTART)\n  ioctl(/dev/sdb, BLKTRACESETUP, blk_user_trace_setup[buf_size=127])\n  ioctl(/dev/sdb, BLKTRACESTART)\n\n  echo 0 \u003e /sys/block/sdb/trace/enable \u0026\n  // Add delay(mdelay/msleep) before kernel enters blk_trace_free()\n\n  ioctl$SG_IO(/dev/sda, SG_IO, ...)\n  // Enters trace_note_tsk() after blk_trace_free() returned\n  // Use mdelay in rcu region rather than msleep(which may schedule out)\n\nRemove blk_trace from running_list before calling blk_trace_free() by\nsysfs if blk_trace is at Blktrace_running state.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47375",
          "url": "https://www.suse.com/security/cve/CVE-2021-47375"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1225193 for CVE-2021-47375",
          "url": "https://bugzilla.suse.com/1225193"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1225194 for CVE-2021-47375",
          "url": "https://bugzilla.suse.com/1225194"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-11T07:41:39Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-47375"
    },
    {
      "cve": "CVE-2021-47378",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47378"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnvme-rdma: destroy cm id before destroy qp to avoid use after free\n\nWe should always destroy cm_id before destroy qp to avoid to get cma\nevent after qp was destroyed, which may lead to use after free.\nIn RDMA connection establishment error flow, don\u0027t destroy qp in cm\nevent handler.Just report cm_error to upper level, qp will be destroy\nin nvme_rdma_alloc_queue() after destroy cm id.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47378",
          "url": "https://www.suse.com/security/cve/CVE-2021-47378"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1225201 for CVE-2021-47378",
          "url": "https://bugzilla.suse.com/1225201"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1225202 for CVE-2021-47378",
          "url": "https://bugzilla.suse.com/1225202"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-11T07:41:39Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-47378"
    },
    {
      "cve": "CVE-2021-47382",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47382"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ns390/qeth: fix deadlock during failing recovery\n\nCommit 0b9902c1fcc5 (\"s390/qeth: fix deadlock during recovery\") removed\ntaking discipline_mutex inside qeth_do_reset(), fixing potential\ndeadlocks. An error path was missed though, that still takes\ndiscipline_mutex and thus has the original deadlock potential.\n\nIntermittent deadlocks were seen when a qeth channel path is configured\noffline, causing a race between qeth_do_reset and ccwgroup_remove.\nCall qeth_set_offline() directly in the qeth_do_reset() error case and\nthen a new variant of ccwgroup_set_offline(), without taking\ndiscipline_mutex.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47382",
          "url": "https://www.suse.com/security/cve/CVE-2021-47382"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1225207 for CVE-2021-47382",
          "url": "https://bugzilla.suse.com/1225207"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-11T07:41:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47382"
    },
    {
      "cve": "CVE-2021-47383",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47383"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntty: Fix out-of-bound vmalloc access in imageblit\n\nThis issue happens when a userspace program does an ioctl\nFBIOPUT_VSCREENINFO passing the fb_var_screeninfo struct\ncontaining only the fields xres, yres, and bits_per_pixel\nwith values.\n\nIf this struct is the same as the previous ioctl, the\nvc_resize() detects it and doesn\u0027t call the resize_screen(),\nleaving the fb_var_screeninfo incomplete. And this leads to\nthe updatescrollmode() calculates a wrong value to\nfbcon_display-\u003evrows, which makes the real_y() return a\nwrong value of y, and that value, eventually, causes\nthe imageblit to access an out-of-bound address value.\n\nTo solve this issue I made the resize_screen() be called\neven if the screen does not need any resizing, so it will\n\"fix and fill\" the fb_var_screeninfo independently.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47383",
          "url": "https://www.suse.com/security/cve/CVE-2021-47383"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1225208 for CVE-2021-47383",
          "url": "https://bugzilla.suse.com/1225208"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1225211 for CVE-2021-47383",
          "url": "https://bugzilla.suse.com/1225211"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-11T07:41:39Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-47383"
    },
    {
      "cve": "CVE-2021-47391",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47391"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/cma: Ensure rdma_addr_cancel() happens before issuing more requests\n\nThe FSM can run in a circle allowing rdma_resolve_ip() to be called twice\non the same id_priv. While this cannot happen without going through the\nwork, it violates the invariant that the same address resolution\nbackground request cannot be active twice.\n\n       CPU 1                                  CPU 2\n\nrdma_resolve_addr():\n  RDMA_CM_IDLE -\u003e RDMA_CM_ADDR_QUERY\n  rdma_resolve_ip(addr_handler)  #1\n\n\t\t\t process_one_req(): for #1\n                          addr_handler():\n                            RDMA_CM_ADDR_QUERY -\u003e RDMA_CM_ADDR_BOUND\n                            mutex_unlock(\u0026id_priv-\u003ehandler_mutex);\n                            [.. handler still running ..]\n\nrdma_resolve_addr():\n  RDMA_CM_ADDR_BOUND -\u003e RDMA_CM_ADDR_QUERY\n  rdma_resolve_ip(addr_handler)\n    !! two requests are now on the req_list\n\nrdma_destroy_id():\n destroy_id_handler_unlock():\n  _destroy_id():\n   cma_cancel_operation():\n    rdma_addr_cancel()\n\n                          // process_one_req() self removes it\n\t\t          spin_lock_bh(\u0026lock);\n                           cancel_delayed_work(\u0026req-\u003ework);\n\t                   if (!list_empty(\u0026req-\u003elist)) == true\n\n      ! rdma_addr_cancel() returns after process_on_req #1 is done\n\n   kfree(id_priv)\n\n\t\t\t process_one_req(): for #2\n                          addr_handler():\n\t                    mutex_lock(\u0026id_priv-\u003ehandler_mutex);\n                            !! Use after free on id_priv\n\nrdma_addr_cancel() expects there to be one req on the list and only\ncancels the first one. The self-removal behavior of the work only happens\nafter the handler has returned. This yields a situations where the\nreq_list can have two reqs for the same \"handle\" but rdma_addr_cancel()\nonly cancels the first one.\n\nThe second req remains active beyond rdma_destroy_id() and will\nuse-after-free id_priv once it inevitably triggers.\n\nFix this by remembering if the id_priv has called rdma_resolve_ip() and\nalways cancel before calling it again. This ensures the req_list never\ngets more than one item in it and doesn\u0027t cost anything in the normal flow\nthat never uses this strange error path.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47391",
          "url": "https://www.suse.com/security/cve/CVE-2021-47391"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1225318 for CVE-2021-47391",
          "url": "https://bugzilla.suse.com/1225318"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1225319 for CVE-2021-47391",
          "url": "https://bugzilla.suse.com/1225319"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-11T07:41:39Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-47391"
    },
    {
      "cve": "CVE-2021-47397",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47397"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsctp: break out if skb_header_pointer returns NULL in sctp_rcv_ootb\n\nWe should always check if skb_header_pointer\u0027s return is NULL before\nusing it, otherwise it may cause null-ptr-deref, as syzbot reported:\n\n  KASAN: null-ptr-deref in range [0x0000000000000000-0x0000000000000007]\n  RIP: 0010:sctp_rcv_ootb net/sctp/input.c:705 [inline]\n  RIP: 0010:sctp_rcv+0x1d84/0x3220 net/sctp/input.c:196\n  Call Trace:\n  \u003cIRQ\u003e\n   sctp6_rcv+0x38/0x60 net/sctp/ipv6.c:1109\n   ip6_protocol_deliver_rcu+0x2e9/0x1ca0 net/ipv6/ip6_input.c:422\n   ip6_input_finish+0x62/0x170 net/ipv6/ip6_input.c:463\n   NF_HOOK include/linux/netfilter.h:307 [inline]\n   NF_HOOK include/linux/netfilter.h:301 [inline]\n   ip6_input+0x9c/0xd0 net/ipv6/ip6_input.c:472\n   dst_input include/net/dst.h:460 [inline]\n   ip6_rcv_finish net/ipv6/ip6_input.c:76 [inline]\n   NF_HOOK include/linux/netfilter.h:307 [inline]\n   NF_HOOK include/linux/netfilter.h:301 [inline]\n   ipv6_rcv+0x28c/0x3c0 net/ipv6/ip6_input.c:297",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47397",
          "url": "https://www.suse.com/security/cve/CVE-2021-47397"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1225082 for CVE-2021-47397",
          "url": "https://bugzilla.suse.com/1225082"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-11T07:41:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47397"
    },
    {
      "cve": "CVE-2021-47400",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47400"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: hns3: do not allow call hns3_nic_net_open repeatedly\n\nhns3_nic_net_open() is not allowed to called repeatly, but there\nis no checking for this. When doing device reset and setup tc\nconcurrently, there is a small oppotunity to call hns3_nic_net_open\nrepeatedly, and cause kernel bug by calling napi_enable twice.\n\nThe calltrace information is like below:\n[ 3078.222780] ------------[ cut here ]------------\n[ 3078.230255] kernel BUG at net/core/dev.c:6991!\n[ 3078.236224] Internal error: Oops - BUG: 0 [#1] PREEMPT SMP\n[ 3078.243431] Modules linked in: hns3 hclgevf hclge hnae3 vfio_iommu_type1 vfio_pci vfio_virqfd vfio pv680_mii(O)\n[ 3078.258880] CPU: 0 PID: 295 Comm: kworker/u8:5 Tainted: G           O      5.14.0-rc4+ #1\n[ 3078.269102] Hardware name:  , BIOS KpxxxFPGA 1P B600 V181 08/12/2021\n[ 3078.276801] Workqueue: hclge hclge_service_task [hclge]\n[ 3078.288774] pstate: 60400009 (nZCv daif +PAN -UAO -TCO BTYPE=--)\n[ 3078.296168] pc : napi_enable+0x80/0x84\ntc qdisc sho[w  3d0e7v8 .e3t0h218 79] lr : hns3_nic_net_open+0x138/0x510 [hns3]\n\n[ 3078.314771] sp : ffff8000108abb20\n[ 3078.319099] x29: ffff8000108abb20 x28: 0000000000000000 x27: ffff0820a8490300\n[ 3078.329121] x26: 0000000000000001 x25: ffff08209cfc6200 x24: 0000000000000000\n[ 3078.339044] x23: ffff0820a8490300 x22: ffff08209cd76000 x21: ffff0820abfe3880\n[ 3078.349018] x20: 0000000000000000 x19: ffff08209cd76900 x18: 0000000000000000\n[ 3078.358620] x17: 0000000000000000 x16: ffffc816e1727a50 x15: 0000ffff8f4ff930\n[ 3078.368895] x14: 0000000000000000 x13: 0000000000000000 x12: 0000259e9dbeb6b4\n[ 3078.377987] x11: 0096a8f7e764eb40 x10: 634615ad28d3eab5 x9 : ffffc816ad8885b8\n[ 3078.387091] x8 : ffff08209cfc6fb8 x7 : ffff0820ac0da058 x6 : ffff0820a8490344\n[ 3078.396356] x5 : 0000000000000140 x4 : 0000000000000003 x3 : ffff08209cd76938\n[ 3078.405365] x2 : 0000000000000000 x1 : 0000000000000010 x0 : ffff0820abfe38a0\n[ 3078.414657] Call trace:\n[ 3078.418517]  napi_enable+0x80/0x84\n[ 3078.424626]  hns3_reset_notify_up_enet+0x78/0xd0 [hns3]\n[ 3078.433469]  hns3_reset_notify+0x64/0x80 [hns3]\n[ 3078.441430]  hclge_notify_client+0x68/0xb0 [hclge]\n[ 3078.450511]  hclge_reset_rebuild+0x524/0x884 [hclge]\n[ 3078.458879]  hclge_reset_service_task+0x3c4/0x680 [hclge]\n[ 3078.467470]  hclge_service_task+0xb0/0xb54 [hclge]\n[ 3078.475675]  process_one_work+0x1dc/0x48c\n[ 3078.481888]  worker_thread+0x15c/0x464\n[ 3078.487104]  kthread+0x160/0x170\n[ 3078.492479]  ret_from_fork+0x10/0x18\n[ 3078.498785] Code: c8027c81 35ffffa2 d50323bf d65f03c0 (d4210000)\n[ 3078.506889] ---[ end trace 8ebe0340a1b0fb44 ]---\n\nOnce hns3_nic_net_open() is excute success, the flag\nHNS3_NIC_STATE_DOWN will be cleared. So add checking for this\nflag, directly return when HNS3_NIC_STATE_DOWN is no set.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47400",
          "url": "https://www.suse.com/security/cve/CVE-2021-47400"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1225329 for CVE-2021-47400",
          "url": "https://bugzilla.suse.com/1225329"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-11T07:41:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47400"
    },
    {
      "cve": "CVE-2021-47401",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47401"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipack: ipoctal: fix stack information leak\n\nThe tty driver name is used also after registering the driver and must\nspecifically not be allocated on the stack to avoid leaking information\nto user space (or triggering an oops).\n\nDrivers should not try to encode topology information in the tty device\nname but this one snuck in through staging without anyone noticing and\nanother driver has since copied this malpractice.\n\nFixing the ABI is a separate issue, but this at least plugs the security\nhole.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47401",
          "url": "https://www.suse.com/security/cve/CVE-2021-47401"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1225242 for CVE-2021-47401",
          "url": "https://bugzilla.suse.com/1225242"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-11T07:41:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47401"
    },
    {
      "cve": "CVE-2021-47404",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47404"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nHID: betop: fix slab-out-of-bounds Write in betop_probe\n\nSyzbot reported slab-out-of-bounds Write bug in hid-betopff driver.\nThe problem is the driver assumes the device must have an input report but\nsome malicious devices violate this assumption.\n\nSo this patch checks hid_device\u0027s input is non empty before it\u0027s been used.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47404",
          "url": "https://www.suse.com/security/cve/CVE-2021-47404"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1225303 for CVE-2021-47404",
          "url": "https://bugzilla.suse.com/1225303"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-11T07:41:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47404"
    },
    {
      "cve": "CVE-2021-47409",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47409"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: dwc2: check return value after calling platform_get_resource()\n\nIt will cause null-ptr-deref if platform_get_resource() returns NULL,\nwe need check the return value.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47409",
          "url": "https://www.suse.com/security/cve/CVE-2021-47409"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1225330 for CVE-2021-47409",
          "url": "https://bugzilla.suse.com/1225330"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-11T07:41:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47409"
    },
    {
      "cve": "CVE-2021-47416",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47416"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nphy: mdio: fix memory leak\n\nSyzbot reported memory leak in MDIO bus interface, the problem was in\nwrong state logic.\n\nMDIOBUS_ALLOCATED indicates 2 states:\n\t1. Bus is only allocated\n\t2. Bus allocated and __mdiobus_register() fails, but\n\t   device_register() was called\n\nIn case of device_register() has been called we should call put_device()\nto correctly free the memory allocated for this device, but mdiobus_free()\ncalls just kfree(dev) in case of MDIOBUS_ALLOCATED state\n\nTo avoid this behaviour we need to set bus-\u003estate to MDIOBUS_UNREGISTERED\n_before_ calling device_register(), because put_device() should be\ncalled even in case of device_register() failure.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47416",
          "url": "https://www.suse.com/security/cve/CVE-2021-47416"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1225189 for CVE-2021-47416",
          "url": "https://bugzilla.suse.com/1225189"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1225336 for CVE-2021-47416",
          "url": "https://bugzilla.suse.com/1225336"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-11T07:41:39Z",
          "details": "low"
        }
      ],
      "title": "CVE-2021-47416"
    },
    {
      "cve": "CVE-2021-47423",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47423"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/nouveau/debugfs: fix file release memory leak\n\nWhen using single_open() for opening, single_release() should be\ncalled, otherwise the \u0027op\u0027 allocated in single_open() will be leaked.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47423",
          "url": "https://www.suse.com/security/cve/CVE-2021-47423"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1225366 for CVE-2021-47423",
          "url": "https://bugzilla.suse.com/1225366"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-11T07:41:39Z",
          "details": "low"
        }
      ],
      "title": "CVE-2021-47423"
    },
    {
      "cve": "CVE-2021-47424",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47424"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ni40e: Fix freeing of uninitialized misc IRQ vector\n\nWhen VSI set up failed in i40e_probe() as part of PF switch set up\ndriver was trying to free misc IRQ vectors in\ni40e_clear_interrupt_scheme and produced a kernel Oops:\n\n   Trying to free already-free IRQ 266\n   WARNING: CPU: 0 PID: 5 at kernel/irq/manage.c:1731 __free_irq+0x9a/0x300\n   Workqueue: events work_for_cpu_fn\n   RIP: 0010:__free_irq+0x9a/0x300\n   Call Trace:\n   ? synchronize_irq+0x3a/0xa0\n   free_irq+0x2e/0x60\n   i40e_clear_interrupt_scheme+0x53/0x190 [i40e]\n   i40e_probe.part.108+0x134b/0x1a40 [i40e]\n   ? kmem_cache_alloc+0x158/0x1c0\n   ? acpi_ut_update_ref_count.part.1+0x8e/0x345\n   ? acpi_ut_update_object_reference+0x15e/0x1e2\n   ? strstr+0x21/0x70\n   ? irq_get_irq_data+0xa/0x20\n   ? mp_check_pin_attr+0x13/0xc0\n   ? irq_get_irq_data+0xa/0x20\n   ? mp_map_pin_to_irq+0xd3/0x2f0\n   ? acpi_register_gsi_ioapic+0x93/0x170\n   ? pci_conf1_read+0xa4/0x100\n   ? pci_bus_read_config_word+0x49/0x70\n   ? do_pci_enable_device+0xcc/0x100\n   local_pci_probe+0x41/0x90\n   work_for_cpu_fn+0x16/0x20\n   process_one_work+0x1a7/0x360\n   worker_thread+0x1cf/0x390\n   ? create_worker+0x1a0/0x1a0\n   kthread+0x112/0x130\n   ? kthread_flush_work_fn+0x10/0x10\n   ret_from_fork+0x1f/0x40\n\nThe problem is that at that point misc IRQ vectors\nwere not allocated yet and we get a call trace\nthat driver is trying to free already free IRQ vectors.\n\nAdd a check in i40e_clear_interrupt_scheme for __I40E_MISC_IRQ_REQUESTED\nPF state before calling i40e_free_misc_vector. This state is set only if\nmisc IRQ vectors were properly initialized.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47424",
          "url": "https://www.suse.com/security/cve/CVE-2021-47424"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1225367 for CVE-2021-47424",
          "url": "https://bugzilla.suse.com/1225367"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-11T07:41:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47424"
    },
    {
      "cve": "CVE-2021-47431",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47431"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amdgpu: fix gart.bo pin_count leak\n\ngmc_v{9,10}_0_gart_disable() isn\u0027t called matched with\ncorrespoding gart_enbale function in SRIOV case. This will\nlead to gart.bo pin_count leak on driver unload.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47431",
          "url": "https://www.suse.com/security/cve/CVE-2021-47431"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1225390 for CVE-2021-47431",
          "url": "https://bugzilla.suse.com/1225390"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-11T07:41:39Z",
          "details": "low"
        }
      ],
      "title": "CVE-2021-47431"
    },
    {
      "cve": "CVE-2021-47435",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47435"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndm: fix mempool NULL pointer race when completing IO\n\ndm_io_dec_pending() calls end_io_acct() first and will then dec md\nin-flight pending count. But if a task is swapping DM table at same\ntime this can result in a crash due to mempool-\u003eelements being NULL:\n\ntask1                             task2\ndo_resume\n -\u003edo_suspend\n  -\u003edm_wait_for_completion\n                                  bio_endio\n\t\t\t\t   -\u003eclone_endio\n\t\t\t\t    -\u003edm_io_dec_pending\n\t\t\t\t     -\u003eend_io_acct\n\t\t\t\t      -\u003ewakeup task1\n -\u003edm_swap_table\n  -\u003e__bind\n   -\u003e__bind_mempools\n    -\u003ebioset_exit\n     -\u003emempool_exit\n                                     -\u003efree_io\n\n[ 67.330330] Unable to handle kernel NULL pointer dereference at\nvirtual address 0000000000000000\n......\n[ 67.330494] pstate: 80400085 (Nzcv daIf +PAN -UAO)\n[ 67.330510] pc : mempool_free+0x70/0xa0\n[ 67.330515] lr : mempool_free+0x4c/0xa0\n[ 67.330520] sp : ffffff8008013b20\n[ 67.330524] x29: ffffff8008013b20 x28: 0000000000000004\n[ 67.330530] x27: ffffffa8c2ff40a0 x26: 00000000ffff1cc8\n[ 67.330535] x25: 0000000000000000 x24: ffffffdada34c800\n[ 67.330541] x23: 0000000000000000 x22: ffffffdada34c800\n[ 67.330547] x21: 00000000ffff1cc8 x20: ffffffd9a1304d80\n[ 67.330552] x19: ffffffdada34c970 x18: 000000b312625d9c\n[ 67.330558] x17: 00000000002dcfbf x16: 00000000000006dd\n[ 67.330563] x15: 000000000093b41e x14: 0000000000000010\n[ 67.330569] x13: 0000000000007f7a x12: 0000000034155555\n[ 67.330574] x11: 0000000000000001 x10: 0000000000000001\n[ 67.330579] x9 : 0000000000000000 x8 : 0000000000000000\n[ 67.330585] x7 : 0000000000000000 x6 : ffffff80148b5c1a\n[ 67.330590] x5 : ffffff8008013ae0 x4 : 0000000000000001\n[ 67.330596] x3 : ffffff80080139c8 x2 : ffffff801083bab8\n[ 67.330601] x1 : 0000000000000000 x0 : ffffffdada34c970\n[ 67.330609] Call trace:\n[ 67.330616] mempool_free+0x70/0xa0\n[ 67.330627] bio_put+0xf8/0x110\n[ 67.330638] dec_pending+0x13c/0x230\n[ 67.330644] clone_endio+0x90/0x180\n[ 67.330649] bio_endio+0x198/0x1b8\n[ 67.330655] dec_pending+0x190/0x230\n[ 67.330660] clone_endio+0x90/0x180\n[ 67.330665] bio_endio+0x198/0x1b8\n[ 67.330673] blk_update_request+0x214/0x428\n[ 67.330683] scsi_end_request+0x2c/0x300\n[ 67.330688] scsi_io_completion+0xa0/0x710\n[ 67.330695] scsi_finish_command+0xd8/0x110\n[ 67.330700] scsi_softirq_done+0x114/0x148\n[ 67.330708] blk_done_softirq+0x74/0xd0\n[ 67.330716] __do_softirq+0x18c/0x374\n[ 67.330724] irq_exit+0xb4/0xb8\n[ 67.330732] __handle_domain_irq+0x84/0xc0\n[ 67.330737] gic_handle_irq+0x148/0x1b0\n[ 67.330744] el1_irq+0xe8/0x190\n[ 67.330753] lpm_cpuidle_enter+0x4f8/0x538\n[ 67.330759] cpuidle_enter_state+0x1fc/0x398\n[ 67.330764] cpuidle_enter+0x18/0x20\n[ 67.330772] do_idle+0x1b4/0x290\n[ 67.330778] cpu_startup_entry+0x20/0x28\n[ 67.330786] secondary_start_kernel+0x160/0x170\n\nFix this by:\n1) Establishing pointers to \u0027struct dm_io\u0027 members in\ndm_io_dec_pending() so that they may be passed into end_io_acct()\n_after_ free_io() is called.\n2) Moving end_io_acct() after free_io().",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47435",
          "url": "https://www.suse.com/security/cve/CVE-2021-47435"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1225247 for CVE-2021-47435",
          "url": "https://bugzilla.suse.com/1225247"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-11T07:41:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47435"
    },
    {
      "cve": "CVE-2021-47436",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47436"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: musb: dsps: Fix the probe error path\n\nCommit 7c75bde329d7 (\"usb: musb: musb_dsps: request_irq() after\ninitializing musb\") has inverted the calls to\ndsps_setup_optional_vbus_irq() and dsps_create_musb_pdev() without\nupdating correctly the error path. dsps_create_musb_pdev() allocates and\nregisters a new platform device which must be unregistered and freed\nwith platform_device_unregister(), and this is missing upon\ndsps_setup_optional_vbus_irq() error.\n\nWhile on the master branch it seems not to trigger any issue, I observed\na kernel crash because of a NULL pointer dereference with a v5.10.70\nstable kernel where the patch mentioned above was backported. With this\nkernel version, -EPROBE_DEFER is returned the first time\ndsps_setup_optional_vbus_irq() is called which triggers the probe to\nerror out without unregistering the platform device. Unfortunately, on\nthe Beagle Bone Black Wireless, the platform device still living in the\nsystem is being used by the USB Ethernet gadget driver, which during the\nboot phase triggers the crash.\n\nMy limited knowledge of the musb world prevents me to revert this commit\nwhich was sent to silence a robot warning which, as far as I understand,\ndoes not make sense. The goal of this patch was to prevent an IRQ to\nfire before the platform device being registered. I think this cannot\never happen due to the fact that enabling the interrupts is done by the\n-\u003eenable() callback of the platform musb device, and this platform\ndevice must be already registered in order for the core or any other\nuser to use this callback.\n\nHence, I decided to fix the error path, which might prevent future\nerrors on mainline kernels while also fixing older ones.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47436",
          "url": "https://www.suse.com/security/cve/CVE-2021-47436"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1225244 for CVE-2021-47436",
          "url": "https://bugzilla.suse.com/1225244"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-11T07:41:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47436"
    },
    {
      "cve": "CVE-2021-47456",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47456"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncan: peak_pci: peak_pci_remove(): fix UAF\n\nWhen remove the module peek_pci, referencing \u0027chan\u0027 again after\nreleasing \u0027dev\u0027 will cause UAF.\n\nFix this by releasing \u0027dev\u0027 later.\n\nThe following log reveals it:\n\n[   35.961814 ] BUG: KASAN: use-after-free in peak_pci_remove+0x16f/0x270 [peak_pci]\n[   35.963414 ] Read of size 8 at addr ffff888136998ee8 by task modprobe/5537\n[   35.965513 ] Call Trace:\n[   35.965718 ]  dump_stack_lvl+0xa8/0xd1\n[   35.966028 ]  print_address_description+0x87/0x3b0\n[   35.966420 ]  kasan_report+0x172/0x1c0\n[   35.966725 ]  ? peak_pci_remove+0x16f/0x270 [peak_pci]\n[   35.967137 ]  ? trace_irq_enable_rcuidle+0x10/0x170\n[   35.967529 ]  ? peak_pci_remove+0x16f/0x270 [peak_pci]\n[   35.967945 ]  __asan_report_load8_noabort+0x14/0x20\n[   35.968346 ]  peak_pci_remove+0x16f/0x270 [peak_pci]\n[   35.968752 ]  pci_device_remove+0xa9/0x250",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47456",
          "url": "https://www.suse.com/security/cve/CVE-2021-47456"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1225256 for CVE-2021-47456",
          "url": "https://bugzilla.suse.com/1225256"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-11T07:41:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47456"
    },
    {
      "cve": "CVE-2021-47458",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47458"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nocfs2: mount fails with buffer overflow in strlen\n\nStarting with kernel 5.11 built with CONFIG_FORTIFY_SOURCE mouting an\nocfs2 filesystem with either o2cb or pcmk cluster stack fails with the\ntrace below.  Problem seems to be that strings for cluster stack and\ncluster name are not guaranteed to be null terminated in the disk\nrepresentation, while strlcpy assumes that the source string is always\nnull terminated.  This causes a read outside of the source string\ntriggering the buffer overflow detection.\n\n  detected buffer overflow in strlen\n  ------------[ cut here ]------------\n  kernel BUG at lib/string.c:1149!\n  invalid opcode: 0000 [#1] SMP PTI\n  CPU: 1 PID: 910 Comm: mount.ocfs2 Not tainted 5.14.0-1-amd64 #1\n    Debian 5.14.6-2\n  RIP: 0010:fortify_panic+0xf/0x11\n  ...\n  Call Trace:\n   ocfs2_initialize_super.isra.0.cold+0xc/0x18 [ocfs2]\n   ocfs2_fill_super+0x359/0x19b0 [ocfs2]\n   mount_bdev+0x185/0x1b0\n   legacy_get_tree+0x27/0x40\n   vfs_get_tree+0x25/0xb0\n   path_mount+0x454/0xa20\n   __x64_sys_mount+0x103/0x140\n   do_syscall_64+0x3b/0xc0\n   entry_SYSCALL_64_after_hwframe+0x44/0xae",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47458",
          "url": "https://www.suse.com/security/cve/CVE-2021-47458"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1225252 for CVE-2021-47458",
          "url": "https://bugzilla.suse.com/1225252"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-11T07:41:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47458"
    },
    {
      "cve": "CVE-2021-47460",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47460"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nocfs2: fix data corruption after conversion from inline format\n\nCommit 6dbf7bb55598 (\"fs: Don\u0027t invalidate page buffers in\nblock_write_full_page()\") uncovered a latent bug in ocfs2 conversion\nfrom inline inode format to a normal inode format.\n\nThe code in ocfs2_convert_inline_data_to_extents() attempts to zero out\nthe whole cluster allocated for file data by grabbing, zeroing, and\ndirtying all pages covering this cluster.  However these pages are\nbeyond i_size, thus writeback code generally ignores these dirty pages\nand no blocks were ever actually zeroed on the disk.\n\nThis oversight was fixed by commit 693c241a5f6a (\"ocfs2: No need to zero\npages past i_size.\") for standard ocfs2 write path, inline conversion\npath was apparently forgotten; the commit log also has a reasoning why\nthe zeroing actually is not needed.\n\nAfter commit 6dbf7bb55598, things became worse as writeback code stopped\ninvalidating buffers on pages beyond i_size and thus these pages end up\nwith clean PageDirty bit but with buffers attached to these pages being\nstill dirty.  So when a file is converted from inline format, then\nwriteback triggers, and then the file is grown so that these pages\nbecome valid, the invalid dirtiness state is preserved,\nmark_buffer_dirty() does nothing on these pages (buffers are already\ndirty) but page is never written back because it is clean.  So data\nwritten to these pages is lost once pages are reclaimed.\n\nSimple reproducer for the problem is:\n\n  xfs_io -f -c \"pwrite 0 2000\" -c \"pwrite 2000 2000\" -c \"fsync\" \\\n    -c \"pwrite 4000 2000\" ocfs2_file\n\nAfter unmounting and mounting the fs again, you can observe that end of\n\u0027ocfs2_file\u0027 has lost its contents.\n\nFix the problem by not doing the pointless zeroing during conversion\nfrom inline format similarly as in the standard write path.\n\n[akpm@linux-foundation.org: fix whitespace, per Joseph]",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47460",
          "url": "https://www.suse.com/security/cve/CVE-2021-47460"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1225251 for CVE-2021-47460",
          "url": "https://bugzilla.suse.com/1225251"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-11T07:41:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47460"
    },
    {
      "cve": "CVE-2021-47469",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47469"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47469",
          "url": "https://www.suse.com/security/cve/CVE-2021-47469"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1225347 for CVE-2021-47469",
          "url": "https://bugzilla.suse.com/1225347"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-11T07:41:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47469"
    },
    {
      "cve": "CVE-2021-47472",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47472"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47472",
          "url": "https://www.suse.com/security/cve/CVE-2021-47472"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1225189 for CVE-2021-47472",
          "url": "https://bugzilla.suse.com/1225189"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 2.5,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-11T07:41:39Z",
          "details": "low"
        }
      ],
      "title": "CVE-2021-47472"
    },
    {
      "cve": "CVE-2021-47473",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47473"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: qla2xxx: Fix a memory leak in an error path of qla2x00_process_els()\n\nCommit 8c0eb596baa5 (\"[SCSI] qla2xxx: Fix a memory leak in an error path of\nqla2x00_process_els()\"), intended to change:\n\n        bsg_job-\u003erequest-\u003emsgcode == FC_BSG_HST_ELS_NOLOGIN\n\n\n        bsg_job-\u003erequest-\u003emsgcode != FC_BSG_RPT_ELS\n\nbut changed it to:\n\n        bsg_job-\u003erequest-\u003emsgcode == FC_BSG_RPT_ELS\n\ninstead.\n\nChange the == to a != to avoid leaking the fcport structure or freeing\nunallocated memory.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47473",
          "url": "https://www.suse.com/security/cve/CVE-2021-47473"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1225192 for CVE-2021-47473",
          "url": "https://bugzilla.suse.com/1225192"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-11T07:41:39Z",
          "details": "low"
        }
      ],
      "title": "CVE-2021-47473"
    },
    {
      "cve": "CVE-2021-47478",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47478"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nisofs: Fix out of bound access for corrupted isofs image\n\nWhen isofs image is suitably corrupted isofs_read_inode() can read data\nbeyond the end of buffer. Sanity-check the directory entry length before\nusing it.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47478",
          "url": "https://www.suse.com/security/cve/CVE-2021-47478"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1225198 for CVE-2021-47478",
          "url": "https://bugzilla.suse.com/1225198"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-11T07:41:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47478"
    },
    {
      "cve": "CVE-2021-47480",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47480"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: core: Put LLD module refcnt after SCSI device is released\n\nSCSI host release is triggered when SCSI device is freed. We have to make\nsure that the low-level device driver module won\u0027t be unloaded before SCSI\nhost instance is released because shost-\u003ehostt is required in the release\nhandler.\n\nMake sure to put LLD module refcnt after SCSI device is released.\n\nFixes a kernel panic of \u0027BUG: unable to handle page fault for address\u0027\nreported by Changhui and Yi.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47480",
          "url": "https://www.suse.com/security/cve/CVE-2021-47480"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1225322 for CVE-2021-47480",
          "url": "https://bugzilla.suse.com/1225322"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-11T07:41:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47480"
    },
    {
      "cve": "CVE-2021-47483",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47483"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nregmap: Fix possible double-free in regcache_rbtree_exit()\n\nIn regcache_rbtree_insert_to_block(), when \u0027present\u0027 realloc failed,\nthe \u0027blk\u0027 which is supposed to assign to \u0027rbnode-\u003eblock\u0027 will be freed,\nso \u0027rbnode-\u003eblock\u0027 points a freed memory, in the error handling path of\nregcache_rbtree_init(), \u0027rbnode-\u003eblock\u0027 will be freed again in\nregcache_rbtree_exit(), KASAN will report double-free as follows:\n\nBUG: KASAN: double-free or invalid-free in kfree+0xce/0x390\nCall Trace:\n slab_free_freelist_hook+0x10d/0x240\n kfree+0xce/0x390\n regcache_rbtree_exit+0x15d/0x1a0\n regcache_rbtree_init+0x224/0x2c0\n regcache_init+0x88d/0x1310\n __regmap_init+0x3151/0x4a80\n __devm_regmap_init+0x7d/0x100\n madera_spi_probe+0x10f/0x333 [madera_spi]\n spi_probe+0x183/0x210\n really_probe+0x285/0xc30\n\nTo fix this, moving up the assignment of rbnode-\u003eblock to immediately after\nthe reallocation has succeeded so that the data structure stays valid even\nif the second reallocation fails.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47483",
          "url": "https://www.suse.com/security/cve/CVE-2021-47483"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1224907 for CVE-2021-47483",
          "url": "https://bugzilla.suse.com/1224907"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1224908 for CVE-2021-47483",
          "url": "https://bugzilla.suse.com/1224908"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-11T07:41:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47483"
    },
    {
      "cve": "CVE-2021-47485",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47485"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nIB/qib: Protect from buffer overflow in struct qib_user_sdma_pkt fields\n\nOverflowing either addrlimit or bytes_togo can allow userspace to trigger\na buffer overflow of kernel memory. Check for overflows in all the places\ndoing math on user controlled buffers.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47485",
          "url": "https://www.suse.com/security/cve/CVE-2021-47485"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1224904 for CVE-2021-47485",
          "url": "https://bugzilla.suse.com/1224904"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-11T07:41:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47485"
    },
    {
      "cve": "CVE-2021-47495",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47495"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusbnet: sanity check for maxpacket\n\nmaxpacket of 0 makes no sense and oopses as we need to divide\nby it. Give up.\n\nV2: fixed typo in log and stylistic issues",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47495",
          "url": "https://www.suse.com/security/cve/CVE-2021-47495"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1225351 for CVE-2021-47495",
          "url": "https://bugzilla.suse.com/1225351"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-11T07:41:39Z",
          "details": "low"
        }
      ],
      "title": "CVE-2021-47495"
    },
    {
      "cve": "CVE-2021-47496",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47496"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/tls: Fix flipped sign in tls_err_abort() calls\n\nsk-\u003esk_err appears to expect a positive value, a convention that ktls\ndoesn\u0027t always follow and that leads to memory corruption in other code.\nFor instance,\n\n    [kworker]\n    tls_encrypt_done(..., err=\u003cnegative error from crypto request\u003e)\n      tls_err_abort(.., err)\n        sk-\u003esk_err = err;\n\n    [task]\n    splice_from_pipe_feed\n      ...\n        tls_sw_do_sendpage\n          if (sk-\u003esk_err) {\n            ret = -sk-\u003esk_err;  // ret is positive\n\n    splice_from_pipe_feed (continued)\n      ret = actor(...)  // ret is still positive and interpreted as bytes\n                        // written, resulting in underflow of buf-\u003elen and\n                        // sd-\u003elen, leading to huge buf-\u003eoffset and bogus\n                        // addresses computed in later calls to actor()\n\nFix all tls_err_abort() callers to pass a negative error code\nconsistently and centralize the error-prone sign flip there, throwing in\na warning to catch future misuse and uninlining the function so it\nreally does only warn once.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47496",
          "url": "https://www.suse.com/security/cve/CVE-2021-47496"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1225354 for CVE-2021-47496",
          "url": "https://bugzilla.suse.com/1225354"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1227656 for CVE-2021-47496",
          "url": "https://bugzilla.suse.com/1227656"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-11T07:41:39Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-47496"
    },
    {
      "cve": "CVE-2021-47497",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47497"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnvmem: Fix shift-out-of-bound (UBSAN) with byte size cells\n\nIf a cell has \u0027nbits\u0027 equal to a multiple of BITS_PER_BYTE the logic\n\n *p \u0026= GENMASK((cell-\u003enbits%BITS_PER_BYTE) - 1, 0);\n\nwill become undefined behavior because nbits modulo BITS_PER_BYTE is 0, and we\nsubtract one from that making a large number that is then shifted more than the\nnumber of bits that fit into an unsigned long.\n\nUBSAN reports this problem:\n\n UBSAN: shift-out-of-bounds in drivers/nvmem/core.c:1386:8\n shift exponent 64 is too large for 64-bit type \u0027unsigned long\u0027\n CPU: 6 PID: 7 Comm: kworker/u16:0 Not tainted 5.15.0-rc3+ #9\n Hardware name: Google Lazor (rev3+) with KB Backlight (DT)\n Workqueue: events_unbound deferred_probe_work_func\n Call trace:\n  dump_backtrace+0x0/0x170\n  show_stack+0x24/0x30\n  dump_stack_lvl+0x64/0x7c\n  dump_stack+0x18/0x38\n  ubsan_epilogue+0x10/0x54\n  __ubsan_handle_shift_out_of_bounds+0x180/0x194\n  __nvmem_cell_read+0x1ec/0x21c\n  nvmem_cell_read+0x58/0x94\n  nvmem_cell_read_variable_common+0x4c/0xb0\n  nvmem_cell_read_variable_le_u32+0x40/0x100\n  a6xx_gpu_init+0x170/0x2f4\n  adreno_bind+0x174/0x284\n  component_bind_all+0xf0/0x264\n  msm_drm_bind+0x1d8/0x7a0\n  try_to_bring_up_master+0x164/0x1ac\n  __component_add+0xbc/0x13c\n  component_add+0x20/0x2c\n  dp_display_probe+0x340/0x384\n  platform_probe+0xc0/0x100\n  really_probe+0x110/0x304\n  __driver_probe_device+0xb8/0x120\n  driver_probe_device+0x4c/0xfc\n  __device_attach_driver+0xb0/0x128\n  bus_for_each_drv+0x90/0xdc\n  __device_attach+0xc8/0x174\n  device_initial_probe+0x20/0x2c\n  bus_probe_device+0x40/0xa4\n  deferred_probe_work_func+0x7c/0xb8\n  process_one_work+0x128/0x21c\n  process_scheduled_works+0x40/0x54\n  worker_thread+0x1ec/0x2a8\n  kthread+0x138/0x158\n  ret_from_fork+0x10/0x20\n\nFix it by making sure there are any bits to mask out.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47497",
          "url": "https://www.suse.com/security/cve/CVE-2021-47497"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1225355 for CVE-2021-47497",
          "url": "https://bugzilla.suse.com/1225355"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1227655 for CVE-2021-47497",
          "url": "https://bugzilla.suse.com/1227655"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 0,
            "baseSeverity": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-11T07:41:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47497"
    },
    {
      "cve": "CVE-2021-47500",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47500"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\niio: mma8452: Fix trigger reference couting\n\nThe mma8452 driver directly assigns a trigger to the struct iio_dev. The\nIIO core when done using this trigger will call `iio_trigger_put()` to drop\nthe reference count by 1.\n\nWithout the matching `iio_trigger_get()` in the driver the reference count\ncan reach 0 too early, the trigger gets freed while still in use and a\nuse-after-free occurs.\n\nFix this by getting a reference to the trigger before assigning it to the\nIIO device.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47500",
          "url": "https://www.suse.com/security/cve/CVE-2021-47500"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1225360 for CVE-2021-47500",
          "url": "https://bugzilla.suse.com/1225360"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1227698 for CVE-2021-47500",
          "url": "https://bugzilla.suse.com/1227698"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-11T07:41:39Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-47500"
    },
    {
      "cve": "CVE-2021-47506",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47506"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnfsd: fix use-after-free due to delegation race\n\nA delegation break could arrive as soon as we\u0027ve called vfs_setlease.  A\ndelegation break runs a callback which immediately (in\nnfsd4_cb_recall_prepare) adds the delegation to del_recall_lru.  If we\nthen exit nfs4_set_delegation without hashing the delegation, it will be\nfreed as soon as the callback is done with it, without ever being\nremoved from del_recall_lru.\n\nSymptoms show up later as use-after-free or list corruption warnings,\nusually in the laundromat thread.\n\nI suspect aba2072f4523 \"nfsd: grant read delegations to clients holding\nwrites\" made this bug easier to hit, but I looked as far back as v3.0\nand it looks to me it already had the same problem.  So I\u0027m not sure\nwhere the bug was introduced; it may have been there from the beginning.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47506",
          "url": "https://www.suse.com/security/cve/CVE-2021-47506"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1225404 for CVE-2021-47506",
          "url": "https://bugzilla.suse.com/1225404"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1227497 for CVE-2021-47506",
          "url": "https://bugzilla.suse.com/1227497"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-11T07:41:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47506"
    },
    {
      "cve": "CVE-2021-47509",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47509"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: pcm: oss: Limit the period size to 16MB\n\nSet the practical limit to the period size (the fragment shift in OSS)\ninstead of a full 31bit; a too large value could lead to the exhaust\nof memory as we allocate temporary buffers of the period size, too.\n\nAs of this patch, we set to 16MB limit, which should cover all use\ncases.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47509",
          "url": "https://www.suse.com/security/cve/CVE-2021-47509"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1225409 for CVE-2021-47509",
          "url": "https://bugzilla.suse.com/1225409"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-11T07:41:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47509"
    },
    {
      "cve": "CVE-2021-47511",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47511"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: pcm: oss: Fix negative period/buffer sizes\n\nThe period size calculation in OSS layer may receive a negative value\nas an error, but the code there assumes only the positive values and\nhandle them with size_t.  Due to that, a too big value may be passed\nto the lower layers.\n\nThis patch changes the code to handle with ssize_t and adds the proper\nerror checks appropriately.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47511",
          "url": "https://www.suse.com/security/cve/CVE-2021-47511"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1225411 for CVE-2021-47511",
          "url": "https://bugzilla.suse.com/1225411"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1227700 for CVE-2021-47511",
          "url": "https://bugzilla.suse.com/1227700"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-11T07:41:39Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-47511"
    },
    {
      "cve": "CVE-2021-47523",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47523"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nIB/hfi1: Fix leak of rcvhdrtail_dummy_kvaddr\n\nThis buffer is currently allocated in hfi1_init():\n\n\tif (reinit)\n\t\tret = init_after_reset(dd);\n\telse\n\t\tret = loadtime_init(dd);\n\tif (ret)\n\t\tgoto done;\n\n\t/* allocate dummy tail memory for all receive contexts */\n\tdd-\u003ercvhdrtail_dummy_kvaddr = dma_alloc_coherent(\u0026dd-\u003epcidev-\u003edev,\n\t\t\t\t\t\t\t sizeof(u64),\n\t\t\t\t\t\t\t \u0026dd-\u003ercvhdrtail_dummy_dma,\n\t\t\t\t\t\t\t GFP_KERNEL);\n\n\tif (!dd-\u003ercvhdrtail_dummy_kvaddr) {\n\t\tdd_dev_err(dd, \"cannot allocate dummy tail memory\\n\");\n\t\tret = -ENOMEM;\n\t\tgoto done;\n\t}\n\nThe reinit triggered path will overwrite the old allocation and leak it.\n\nFix by moving the allocation to hfi1_alloc_devdata() and the deallocation\nto hfi1_free_devdata().",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47523",
          "url": "https://www.suse.com/security/cve/CVE-2021-47523"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1225438 for CVE-2021-47523",
          "url": "https://bugzilla.suse.com/1225438"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-11T07:41:39Z",
          "details": "low"
        }
      ],
      "title": "CVE-2021-47523"
    },
    {
      "cve": "CVE-2021-47541",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47541"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/mlx4_en: Fix an use-after-free bug in mlx4_en_try_alloc_resources()\n\nIn mlx4_en_try_alloc_resources(), mlx4_en_copy_priv() is called and\ntmp-\u003etx_cq will be freed on the error path of mlx4_en_copy_priv().\nAfter that mlx4_en_alloc_resources() is called and there is a dereference\nof \u0026tmp-\u003etx_cq[t][i] in mlx4_en_alloc_resources(), which could lead to\na use after free problem on failure of mlx4_en_copy_priv().\n\nFix this bug by adding a check of mlx4_en_copy_priv()\n\nThis bug was found by a static analyzer. The analysis employs\ndifferential checking to identify inconsistent security operations\n(e.g., checks or kfrees) between two code paths and confirms that the\ninconsistent operations are not recovered in the current function or\nthe callers, so they constitute bugs.\n\nNote that, as a bug found by static analysis, it can be a false\npositive or hard to trigger. Multiple researchers have cross-reviewed\nthe bug.\n\nBuilds with CONFIG_MLX4_EN=m show no new warnings,\nand our static analyzer no longer warns about this code.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47541",
          "url": "https://www.suse.com/security/cve/CVE-2021-47541"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1225453 for CVE-2021-47541",
          "url": "https://bugzilla.suse.com/1225453"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1225454 for CVE-2021-47541",
          "url": "https://bugzilla.suse.com/1225454"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-11T07:41:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47541"
    },
    {
      "cve": "CVE-2021-47548",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47548"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nethernet: hisilicon: hns: hns_dsaf_misc: fix a possible array overflow in hns_dsaf_ge_srst_by_port()\n\nThe if statement:\n  if (port \u003e= DSAF_GE_NUM)\n        return;\n\nlimits the value of port less than DSAF_GE_NUM (i.e., 8).\nHowever, if the value of port is 6 or 7, an array overflow could occur:\n  port_rst_off = dsaf_dev-\u003emac_cb[port]-\u003eport_rst_off;\n\nbecause the length of dsaf_dev-\u003emac_cb is DSAF_MAX_PORT_NUM (i.e., 6).\n\nTo fix this possible array overflow, we first check port and if it is\ngreater than or equal to DSAF_MAX_PORT_NUM, the function returns.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47548",
          "url": "https://www.suse.com/security/cve/CVE-2021-47548"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1225506 for CVE-2021-47548",
          "url": "https://bugzilla.suse.com/1225506"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.6,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-11T07:41:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47548"
    },
    {
      "cve": "CVE-2021-47565",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47565"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: mpt3sas: Fix kernel panic during drive powercycle test\n\nWhile looping over shost\u0027s sdev list it is possible that one\nof the drives is getting removed and its sas_target object is\nfreed but its sdev object remains intact.\n\nConsequently, a kernel panic can occur while the driver is trying to access\nthe sas_address field of sas_target object without also checking the\nsas_target object for NULL.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47565",
          "url": "https://www.suse.com/security/cve/CVE-2021-47565"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1225384 for CVE-2021-47565",
          "url": "https://bugzilla.suse.com/1225384"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-11T07:41:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47565"
    },
    {
      "cve": "CVE-2022-48686",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-48686"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnvme-tcp: fix UAF when detecting digest errors\n\nWe should also bail from the io_work loop when we set rd_enabled to true,\nso we don\u0027t attempt to read data from the socket when the TCP stream is\nalready out-of-sync or corrupted.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-48686",
          "url": "https://www.suse.com/security/cve/CVE-2022-48686"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223948 for CVE-2022-48686",
          "url": "https://bugzilla.suse.com/1223948"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1226337 for CVE-2022-48686",
          "url": "https://bugzilla.suse.com/1226337"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-11T07:41:39Z",
          "details": "important"
        }
      ],
      "title": "CVE-2022-48686"
    },
    {
      "cve": "CVE-2022-48697",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-48697"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnvmet: fix a use-after-free\n\nFix the following use-after-free complaint triggered by blktests nvme/004:\n\nBUG: KASAN: user-memory-access in blk_mq_complete_request_remote+0xac/0x350\nRead of size 4 at addr 0000607bd1835943 by task kworker/13:1/460\nWorkqueue: nvmet-wq nvme_loop_execute_work [nvme_loop]\nCall Trace:\n show_stack+0x52/0x58\n dump_stack_lvl+0x49/0x5e\n print_report.cold+0x36/0x1e2\n kasan_report+0xb9/0xf0\n __asan_load4+0x6b/0x80\n blk_mq_complete_request_remote+0xac/0x350\n nvme_loop_queue_response+0x1df/0x275 [nvme_loop]\n __nvmet_req_complete+0x132/0x4f0 [nvmet]\n nvmet_req_complete+0x15/0x40 [nvmet]\n nvmet_execute_io_connect+0x18a/0x1f0 [nvmet]\n nvme_loop_execute_work+0x20/0x30 [nvme_loop]\n process_one_work+0x56e/0xa70\n worker_thread+0x2d1/0x640\n kthread+0x183/0x1c0\n ret_from_fork+0x1f/0x30",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-48697",
          "url": "https://www.suse.com/security/cve/CVE-2022-48697"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223922 for CVE-2022-48697",
          "url": "https://bugzilla.suse.com/1223922"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-11T07:41:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-48697"
    },
    {
      "cve": "CVE-2022-48704",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-48704"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/radeon: add a force flush to delay work when radeon\n\nAlthough radeon card fence and wait for gpu to finish processing current batch rings,\nthere is still a corner case that radeon lockup work queue may not be fully flushed,\nand meanwhile the radeon_suspend_kms() function has called pci_set_power_state() to\nput device in D3hot state.\nPer PCI spec rev 4.0 on 5.3.1.4.1 D3hot State.\n\u003e Configuration and Message requests are the only TLPs accepted by a Function in\n\u003e the D3hot state. All other received Requests must be handled as Unsupported Requests,\n\u003e and all received Completions may optionally be handled as Unexpected Completions.\nThis issue will happen in following logs:\nUnable to handle kernel paging request at virtual address 00008800e0008010\nCPU 0 kworker/0:3(131): Oops 0\npc = [\u003cffffffff811bea5c\u003e]  ra = [\u003cffffffff81240844\u003e]  ps = 0000 Tainted: G        W\npc is at si_gpu_check_soft_reset+0x3c/0x240\nra is at si_dma_is_lockup+0x34/0xd0\nv0 = 0000000000000000  t0 = fff08800e0008010  t1 = 0000000000010000\nt2 = 0000000000008010  t3 = fff00007e3c00000  t4 = fff00007e3c00258\nt5 = 000000000000ffff  t6 = 0000000000000001  t7 = fff00007ef078000\ns0 = fff00007e3c016e8  s1 = fff00007e3c00000  s2 = fff00007e3c00018\ns3 = fff00007e3c00000  s4 = fff00007fff59d80  s5 = 0000000000000000\ns6 = fff00007ef07bd98\na0 = fff00007e3c00000  a1 = fff00007e3c016e8  a2 = 0000000000000008\na3 = 0000000000000001  a4 = 8f5c28f5c28f5c29  a5 = ffffffff810f4338\nt8 = 0000000000000275  t9 = ffffffff809b66f8  t10 = ff6769c5d964b800\nt11= 000000000000b886  pv = ffffffff811bea20  at = 0000000000000000\ngp = ffffffff81d89690  sp = 00000000aa814126\nDisabling lock debugging due to kernel taint\nTrace:\n[\u003cffffffff81240844\u003e] si_dma_is_lockup+0x34/0xd0\n[\u003cffffffff81119610\u003e] radeon_fence_check_lockup+0xd0/0x290\n[\u003cffffffff80977010\u003e] process_one_work+0x280/0x550\n[\u003cffffffff80977350\u003e] worker_thread+0x70/0x7c0\n[\u003cffffffff80977410\u003e] worker_thread+0x130/0x7c0\n[\u003cffffffff80982040\u003e] kthread+0x200/0x210\n[\u003cffffffff809772e0\u003e] worker_thread+0x0/0x7c0\n[\u003cffffffff80981f8c\u003e] kthread+0x14c/0x210\n[\u003cffffffff80911658\u003e] ret_from_kernel_thread+0x18/0x20\n[\u003cffffffff80981e40\u003e] kthread+0x0/0x210\n Code: ad3e0008  43f0074a  ad7e0018  ad9e0020  8c3001e8  40230101\n \u003c88210000\u003e 4821ed21\nSo force lockup work queue flush to fix this problem.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-48704",
          "url": "https://www.suse.com/security/cve/CVE-2022-48704"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223932 for CVE-2022-48704",
          "url": "https://bugzilla.suse.com/1223932"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-11T07:41:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-48704"
    },
    {
      "cve": "CVE-2022-48708",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-48708"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\npinctrl: single: fix potential NULL dereference\n\nAdded checking of pointer \"function\" in pcs_set_mux().\npinmux_generic_get_function() can return NULL and the pointer\n\"function\" was dereferenced without checking against NULL.\n\nFound by Linux Verification Center (linuxtesting.org) with SVACE.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-48708",
          "url": "https://www.suse.com/security/cve/CVE-2022-48708"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1224942 for CVE-2022-48708",
          "url": "https://bugzilla.suse.com/1224942"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-11T07:41:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-48708"
    },
    {
      "cve": "CVE-2022-48710",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-48710"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/radeon: fix a possible null pointer dereference\n\nIn radeon_fp_native_mode(), the return value of drm_mode_duplicate()\nis assigned to mode, which will lead to a NULL pointer dereference\non failure of drm_mode_duplicate(). Add a check to avoid npd.\n\nThe failure status of drm_cvt_mode() on the other path is checked too.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-48710",
          "url": "https://www.suse.com/security/cve/CVE-2022-48710"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1225230 for CVE-2022-48710",
          "url": "https://bugzilla.suse.com/1225230"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-11T07:41:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-48710"
    },
    {
      "cve": "CVE-2023-0160",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-0160"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A deadlock flaw was found in the Linux kernel\u0027s BPF subsystem. This flaw allows a local user to potentially crash the system.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-0160",
          "url": "https://www.suse.com/security/cve/CVE-2023-0160"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1209657 for CVE-2023-0160",
          "url": "https://bugzilla.suse.com/1209657"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-11T07:41:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-0160"
    },
    {
      "cve": "CVE-2023-1829",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-1829"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A use-after-free vulnerability in the Linux Kernel traffic control index filter (tcindex) can be exploited to achieve local privilege escalation.  The tcindex_delete function which does not properly deactivate filters in case of a perfect hashes while deleting the underlying structure which can later lead to double freeing the structure.  A local attacker user can use this vulnerability to elevate its privileges to root.\nWe recommend upgrading past commit 8c710f75256bb3cf05ac7b1672c82b92c43f3d28.\n\n",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-1829",
          "url": "https://www.suse.com/security/cve/CVE-2023-1829"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1210335 for CVE-2023-1829",
          "url": "https://bugzilla.suse.com/1210335"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1210619 for CVE-2023-1829",
          "url": "https://bugzilla.suse.com/1210619"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1217444 for CVE-2023-1829",
          "url": "https://bugzilla.suse.com/1217444"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1217531 for CVE-2023-1829",
          "url": "https://bugzilla.suse.com/1217531"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1220886 for CVE-2023-1829",
          "url": "https://bugzilla.suse.com/1220886"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1228311 for CVE-2023-1829",
          "url": "https://bugzilla.suse.com/1228311"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-11T07:41:39Z",
          "details": "important"
        }
      ],
      "title": "CVE-2023-1829"
    },
    {
      "cve": "CVE-2023-42755",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-42755"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A flaw was found in the IPv4 Resource Reservation Protocol (RSVP) classifier in the Linux kernel. The xprt pointer may go beyond the linear part of the skb, leading to an out-of-bounds read in the `rsvp_classify` function. This issue may allow a local user to crash the system and cause a denial of service.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-42755",
          "url": "https://www.suse.com/security/cve/CVE-2023-42755"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1215702 for CVE-2023-42755",
          "url": "https://bugzilla.suse.com/1215702"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-11T07:41:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-42755"
    },
    {
      "cve": "CVE-2023-47233",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-47233"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The brcm80211 component in the Linux kernel through 6.5.10 has a brcmf_cfg80211_detach use-after-free in the device unplugging (disconnect the USB by hotplug) code. For physically proximate attackers with local access, this \"could be exploited in a real world scenario.\" This is related to brcmf_cfg80211_escan_timeout_worker in drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-47233",
          "url": "https://www.suse.com/security/cve/CVE-2023-47233"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1216702 for CVE-2023-47233",
          "url": "https://bugzilla.suse.com/1216702"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1224592 for CVE-2023-47233",
          "url": "https://bugzilla.suse.com/1224592"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-11T07:41:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-47233"
    },
    {
      "cve": "CVE-2023-52527",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-52527"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipv4, ipv6: Fix handling of transhdrlen in __ip{,6}_append_data()\n\nIncluding the transhdrlen in length is a problem when the packet is\npartially filled (e.g. something like send(MSG_MORE) happened previously)\nwhen appending to an IPv4 or IPv6 packet as we don\u0027t want to repeat the\ntransport header or account for it twice.  This can happen under some\ncircumstances, such as splicing into an L2TP socket.\n\nThe symptom observed is a warning in __ip6_append_data():\n\n    WARNING: CPU: 1 PID: 5042 at net/ipv6/ip6_output.c:1800 __ip6_append_data.isra.0+0x1be8/0x47f0 net/ipv6/ip6_output.c:1800\n\nthat occurs when MSG_SPLICE_PAGES is used to append more data to an already\npartially occupied skbuff.  The warning occurs when \u0027copy\u0027 is larger than\nthe amount of data in the message iterator.  This is because the requested\nlength includes the transport header length when it shouldn\u0027t.  This can be\ntriggered by, for example:\n\n        sfd = socket(AF_INET6, SOCK_DGRAM, IPPROTO_L2TP);\n        bind(sfd, ...); // ::1\n        connect(sfd, ...); // ::1 port 7\n        send(sfd, buffer, 4100, MSG_MORE);\n        sendfile(sfd, dfd, NULL, 1024);\n\nFix this by only adding transhdrlen into the length if the write queue is\nempty in l2tp_ip6_sendmsg(), analogously to how UDP does things.\n\nl2tp_ip_sendmsg() looks like it won\u0027t suffer from this problem as it builds\nthe UDP packet itself.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-52527",
          "url": "https://www.suse.com/security/cve/CVE-2023-52527"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1220928 for CVE-2023-52527",
          "url": "https://bugzilla.suse.com/1220928"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-11T07:41:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-52527"
    },
    {
      "cve": "CVE-2023-52586",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-52586"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/msm/dpu: Add mutex lock in control vblank irq\n\nAdd a mutex lock to control vblank irq to synchronize vblank\nenable/disable operations happening from different threads to prevent\nrace conditions while registering/unregistering the vblank irq callback.\n\nv4: -Removed vblank_ctl_lock from dpu_encoder_virt, so it is only a\n    parameter of dpu_encoder_phys.\n    -Switch from atomic refcnt to a simple int counter as mutex has\n    now been added\nv3: Mistakenly did not change wording in last version. It is done now.\nv2: Slightly changed wording of commit message\n\nPatchwork: https://patchwork.freedesktop.org/patch/571854/",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-52586",
          "url": "https://www.suse.com/security/cve/CVE-2023-52586"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1221081 for CVE-2023-52586",
          "url": "https://bugzilla.suse.com/1221081"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-11T07:41:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-52586"
    },
    {
      "cve": "CVE-2023-52591",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-52591"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nreiserfs: Avoid touching renamed directory if parent does not change\n\nThe VFS will not be locking moved directory if its parent does not\nchange. Change reiserfs rename code to avoid touching renamed directory\nif its parent does not change as without locking that can corrupt the\nfilesystem.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-52591",
          "url": "https://www.suse.com/security/cve/CVE-2023-52591"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1221044 for CVE-2023-52591",
          "url": "https://bugzilla.suse.com/1221044"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1221578 for CVE-2023-52591",
          "url": "https://bugzilla.suse.com/1221578"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1221598 for CVE-2023-52591",
          "url": "https://bugzilla.suse.com/1221598"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-11T07:41:39Z",
          "details": "important"
        }
      ],
      "title": "CVE-2023-52591"
    },
    {
      "cve": "CVE-2023-52655",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-52655"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: aqc111: check packet for fixup for true limit\n\nIf a device sends a packet that is inbetween 0\nand sizeof(u64) the value passed to skb_trim()\nas length will wrap around ending up as some very\nlarge value.\n\nThe driver will then proceed to parse the header\nlocated at that position, which will either oops or\nprocess some random value.\n\nThe fix is to check against sizeof(u64) rather than\n0, which the driver currently does. The issue exists\nsince the introduction of the driver.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-52655",
          "url": "https://www.suse.com/security/cve/CVE-2023-52655"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1217169 for CVE-2023-52655",
          "url": "https://bugzilla.suse.com/1217169"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.6,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-11T07:41:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-52655"
    },
    {
      "cve": "CVE-2023-52664",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-52664"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: atlantic: eliminate double free in error handling logic\n\nDriver has a logic leak in ring data allocation/free,\nwhere aq_ring_free could be called multiple times on same ring,\nif system is under stress and got memory allocation error.\n\nRing pointer was used as an indicator of failure, but this is\nnot correct since only ring data is allocated/deallocated.\nRing itself is an array member.\n\nChanging ring allocation functions to return error code directly.\nThis simplifies error handling and eliminates aq_ring_free\non higher layer.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-52664",
          "url": "https://www.suse.com/security/cve/CVE-2023-52664"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1224747 for CVE-2023-52664",
          "url": "https://bugzilla.suse.com/1224747"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-11T07:41:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-52664"
    },
    {
      "cve": "CVE-2023-52685",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-52685"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-52685",
          "url": "https://www.suse.com/security/cve/CVE-2023-52685"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1224728 for CVE-2023-52685",
          "url": "https://bugzilla.suse.com/1224728"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-11T07:41:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-52685"
    },
    {
      "cve": "CVE-2023-52686",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-52686"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\npowerpc/powernv: Add a null pointer check in opal_event_init()\n\nkasprintf() returns a pointer to dynamically allocated memory\nwhich can be NULL upon failure.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-52686",
          "url": "https://www.suse.com/security/cve/CVE-2023-52686"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1224682 for CVE-2023-52686",
          "url": "https://bugzilla.suse.com/1224682"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-11T07:41:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-52686"
    },
    {
      "cve": "CVE-2023-52691",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-52691"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/pm: fix a double-free in si_dpm_init\n\nWhen the allocation of\nadev-\u003epm.dpm.dyn_state.vddc_dependency_on_dispclk.entries fails,\namdgpu_free_extended_power_table is called to free some fields of adev.\nHowever, when the control flow returns to si_dpm_sw_init, it goes to\nlabel dpm_failed and calls si_dpm_fini, which calls\namdgpu_free_extended_power_table again and free those fields again. Thus\na double-free is triggered.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-52691",
          "url": "https://www.suse.com/security/cve/CVE-2023-52691"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1224607 for CVE-2023-52691",
          "url": "https://bugzilla.suse.com/1224607"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-11T07:41:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-52691"
    },
    {
      "cve": "CVE-2023-52696",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-52696"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\npowerpc/powernv: Add a null pointer check in opal_powercap_init()\n\nkasprintf() returns a pointer to dynamically allocated memory\nwhich can be NULL upon failure.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-52696",
          "url": "https://www.suse.com/security/cve/CVE-2023-52696"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1224601 for CVE-2023-52696",
          "url": "https://bugzilla.suse.com/1224601"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-11T07:41:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-52696"
    },
    {
      "cve": "CVE-2023-52698",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-52698"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncalipso: fix memory leak in netlbl_calipso_add_pass()\n\nIf IPv6 support is disabled at boot (ipv6.disable=1),\nthe calipso_init() -\u003e netlbl_calipso_ops_register() function isn\u0027t called,\nand the netlbl_calipso_ops_get() function always returns NULL.\nIn this case, the netlbl_calipso_add_pass() function allocates memory\nfor the doi_def variable but doesn\u0027t free it with the calipso_doi_free().\n\nBUG: memory leak\nunreferenced object 0xffff888011d68180 (size 64):\n  comm \"syz-executor.1\", pid 10746, jiffies 4295410986 (age 17.928s)\n  hex dump (first 32 bytes):\n    00 00 00 00 02 00 00 00 00 00 00 00 00 00 00 00  ................\n    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................\n  backtrace:\n    [\u003c...\u003e] kmalloc include/linux/slab.h:552 [inline]\n    [\u003c...\u003e] netlbl_calipso_add_pass net/netlabel/netlabel_calipso.c:76 [inline]\n    [\u003c...\u003e] netlbl_calipso_add+0x22e/0x4f0 net/netlabel/netlabel_calipso.c:111\n    [\u003c...\u003e] genl_family_rcv_msg_doit+0x22f/0x330 net/netlink/genetlink.c:739\n    [\u003c...\u003e] genl_family_rcv_msg net/netlink/genetlink.c:783 [inline]\n    [\u003c...\u003e] genl_rcv_msg+0x341/0x5a0 net/netlink/genetlink.c:800\n    [\u003c...\u003e] netlink_rcv_skb+0x14d/0x440 net/netlink/af_netlink.c:2515\n    [\u003c...\u003e] genl_rcv+0x29/0x40 net/netlink/genetlink.c:811\n    [\u003c...\u003e] netlink_unicast_kernel net/netlink/af_netlink.c:1313 [inline]\n    [\u003c...\u003e] netlink_unicast+0x54b/0x800 net/netlink/af_netlink.c:1339\n    [\u003c...\u003e] netlink_sendmsg+0x90a/0xdf0 net/netlink/af_netlink.c:1934\n    [\u003c...\u003e] sock_sendmsg_nosec net/socket.c:651 [inline]\n    [\u003c...\u003e] sock_sendmsg+0x157/0x190 net/socket.c:671\n    [\u003c...\u003e] ____sys_sendmsg+0x712/0x870 net/socket.c:2342\n    [\u003c...\u003e] ___sys_sendmsg+0xf8/0x170 net/socket.c:2396\n    [\u003c...\u003e] __sys_sendmsg+0xea/0x1b0 net/socket.c:2429\n    [\u003c...\u003e] do_syscall_64+0x30/0x40 arch/x86/entry/common.c:46\n    [\u003c...\u003e] entry_SYSCALL_64_after_hwframe+0x61/0xc6\n\nFound by InfoTeCS on behalf of Linux Verification Center\n(linuxtesting.org) with Syzkaller\n\n[PM: merged via the LSM tree at Jakub Kicinski request]",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-52698",
          "url": "https://www.suse.com/security/cve/CVE-2023-52698"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1224621 for CVE-2023-52698",
          "url": "https://bugzilla.suse.com/1224621"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.4,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-11T07:41:39Z",
          "details": "low"
        }
      ],
      "title": "CVE-2023-52698"
    },
    {
      "cve": "CVE-2023-52703",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-52703"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/usb: kalmia: Don\u0027t pass act_len in usb_bulk_msg error path\n\nsyzbot reported that act_len in kalmia_send_init_packet() is\nuninitialized when passing it to the first usb_bulk_msg error path. Jiri\nPirko noted that it\u0027s pointless to pass it in the error path, and that\nthe value that would be printed in the second error path would be the\nvalue of act_len from the first call to usb_bulk_msg.[1]\n\nWith this in mind, let\u0027s just not pass act_len to the usb_bulk_msg error\npaths.\n\n1: https://lore.kernel.org/lkml/Y9pY61y1nwTuzMOa@nanopsycho/",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-52703",
          "url": "https://www.suse.com/security/cve/CVE-2023-52703"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1225549 for CVE-2023-52703",
          "url": "https://bugzilla.suse.com/1225549"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-11T07:41:39Z",
          "details": "low"
        }
      ],
      "title": "CVE-2023-52703"
    },
    {
      "cve": "CVE-2023-52730",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-52730"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmmc: sdio: fix possible resource leaks in some error paths\n\nIf sdio_add_func() or sdio_init_func() fails, sdio_remove_func() can\nnot release the resources, because the sdio function is not presented\nin these two cases, it won\u0027t call of_node_put() or put_device().\n\nTo fix these leaks, make sdio_func_present() only control whether\ndevice_del() needs to be called or not, then always call of_node_put()\nand put_device().\n\nIn error case in sdio_init_func(), the reference of \u0027card-\u003edev\u0027 is\nnot get, to avoid redundant put in sdio_free_func_cis(), move the\nget_device() to sdio_alloc_func() and put_device() to sdio_release_func(),\nit can keep the get/put function be balanced.\n\nWithout this patch, while doing fault inject test, it can get the\nfollowing leak reports, after this fix, the leak is gone.\n\nunreferenced object 0xffff888112514000 (size 2048):\n  comm \"kworker/3:2\", pid 65, jiffies 4294741614 (age 124.774s)\n  hex dump (first 32 bytes):\n    00 e0 6f 12 81 88 ff ff 60 58 8d 06 81 88 ff ff  ..o.....`X......\n    10 40 51 12 81 88 ff ff 10 40 51 12 81 88 ff ff  .@Q......@Q.....\n  backtrace:\n    [\u003c000000009e5931da\u003e] kmalloc_trace+0x21/0x110\n    [\u003c000000002f839ccb\u003e] mmc_alloc_card+0x38/0xb0 [mmc_core]\n    [\u003c0000000004adcbf6\u003e] mmc_sdio_init_card+0xde/0x170 [mmc_core]\n    [\u003c000000007538fea0\u003e] mmc_attach_sdio+0xcb/0x1b0 [mmc_core]\n    [\u003c00000000d4fdeba7\u003e] mmc_rescan+0x54a/0x640 [mmc_core]\n\nunreferenced object 0xffff888112511000 (size 2048):\n  comm \"kworker/3:2\", pid 65, jiffies 4294741623 (age 124.766s)\n  hex dump (first 32 bytes):\n    00 40 51 12 81 88 ff ff e0 58 8d 06 81 88 ff ff  .@Q......X......\n    10 10 51 12 81 88 ff ff 10 10 51 12 81 88 ff ff  ..Q.......Q.....\n  backtrace:\n    [\u003c000000009e5931da\u003e] kmalloc_trace+0x21/0x110\n    [\u003c00000000fcbe706c\u003e] sdio_alloc_func+0x35/0x100 [mmc_core]\n    [\u003c00000000c68f4b50\u003e] mmc_attach_sdio.cold.18+0xb1/0x395 [mmc_core]\n    [\u003c00000000d4fdeba7\u003e] mmc_rescan+0x54a/0x640 [mmc_core]",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-52730",
          "url": "https://www.suse.com/security/cve/CVE-2023-52730"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1224956 for CVE-2023-52730",
          "url": "https://bugzilla.suse.com/1224956"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-11T07:41:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-52730"
    },
    {
      "cve": "CVE-2023-52732",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-52732"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nceph: blocklist the kclient when receiving corrupted snap trace\n\nWhen received corrupted snap trace we don\u0027t know what exactly has\nhappened in MDS side. And we shouldn\u0027t continue IOs and metadatas\naccess to MDS, which may corrupt or get incorrect contents.\n\nThis patch will just block all the further IO/MDS requests\nimmediately and then evict the kclient itself.\n\nThe reason why we still need to evict the kclient just after\nblocking all the further IOs is that the MDS could revoke the caps\nfaster.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-52732",
          "url": "https://www.suse.com/security/cve/CVE-2023-52732"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1225222 for CVE-2023-52732",
          "url": "https://bugzilla.suse.com/1225222"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-11T07:41:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-52732"
    },
    {
      "cve": "CVE-2023-52741",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-52741"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncifs: Fix use-after-free in rdata-\u003eread_into_pages()\n\nWhen the network status is unstable, use-after-free may occur when\nread data from the server.\n\n  BUG: KASAN: use-after-free in readpages_fill_pages+0x14c/0x7e0\n\n  Call Trace:\n   \u003cTASK\u003e\n   dump_stack_lvl+0x38/0x4c\n   print_report+0x16f/0x4a6\n   kasan_report+0xb7/0x130\n   readpages_fill_pages+0x14c/0x7e0\n   cifs_readv_receive+0x46d/0xa40\n   cifs_demultiplex_thread+0x121c/0x1490\n   kthread+0x16b/0x1a0\n   ret_from_fork+0x2c/0x50\n   \u003c/TASK\u003e\n\n  Allocated by task 2535:\n   kasan_save_stack+0x22/0x50\n   kasan_set_track+0x25/0x30\n   __kasan_kmalloc+0x82/0x90\n   cifs_readdata_direct_alloc+0x2c/0x110\n   cifs_readdata_alloc+0x2d/0x60\n   cifs_readahead+0x393/0xfe0\n   read_pages+0x12f/0x470\n   page_cache_ra_unbounded+0x1b1/0x240\n   filemap_get_pages+0x1c8/0x9a0\n   filemap_read+0x1c0/0x540\n   cifs_strict_readv+0x21b/0x240\n   vfs_read+0x395/0x4b0\n   ksys_read+0xb8/0x150\n   do_syscall_64+0x3f/0x90\n   entry_SYSCALL_64_after_hwframe+0x72/0xdc\n\n  Freed by task 79:\n   kasan_save_stack+0x22/0x50\n   kasan_set_track+0x25/0x30\n   kasan_save_free_info+0x2e/0x50\n   __kasan_slab_free+0x10e/0x1a0\n   __kmem_cache_free+0x7a/0x1a0\n   cifs_readdata_release+0x49/0x60\n   process_one_work+0x46c/0x760\n   worker_thread+0x2a4/0x6f0\n   kthread+0x16b/0x1a0\n   ret_from_fork+0x2c/0x50\n\n  Last potentially related work creation:\n   kasan_save_stack+0x22/0x50\n   __kasan_record_aux_stack+0x95/0xb0\n   insert_work+0x2b/0x130\n   __queue_work+0x1fe/0x660\n   queue_work_on+0x4b/0x60\n   smb2_readv_callback+0x396/0x800\n   cifs_abort_connection+0x474/0x6a0\n   cifs_reconnect+0x5cb/0xa50\n   cifs_readv_from_socket.cold+0x22/0x6c\n   cifs_read_page_from_socket+0xc1/0x100\n   readpages_fill_pages.cold+0x2f/0x46\n   cifs_readv_receive+0x46d/0xa40\n   cifs_demultiplex_thread+0x121c/0x1490\n   kthread+0x16b/0x1a0\n   ret_from_fork+0x2c/0x50\n\nThe following function calls will cause UAF of the rdata pointer.\n\nreadpages_fill_pages\n cifs_read_page_from_socket\n  cifs_readv_from_socket\n   cifs_reconnect\n    __cifs_reconnect\n     cifs_abort_connection\n      mid-\u003ecallback() --\u003e smb2_readv_callback\n       queue_work(\u0026rdata-\u003ework)  # if the worker completes first,\n                                 # the rdata is freed\n          cifs_readv_complete\n            kref_put\n              cifs_readdata_release\n                kfree(rdata)\n return rdata-\u003e...               # UAF in readpages_fill_pages()\n\nSimilarly, this problem also occurs in the uncache_fill_pages().\n\nFix this by adjusts the order of condition judgment in the return\nstatement.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-52741",
          "url": "https://www.suse.com/security/cve/CVE-2023-52741"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1225479 for CVE-2023-52741",
          "url": "https://bugzilla.suse.com/1225479"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-11T07:41:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-52741"
    },
    {
      "cve": "CVE-2023-52742",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-52742"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: USB: Fix wrong-direction WARNING in plusb.c\n\nThe syzbot fuzzer detected a bug in the plusb network driver: A\nzero-length control-OUT transfer was treated as a read instead of a\nwrite.  In modern kernels this error provokes a WARNING:\n\nusb 1-1: BOGUS control dir, pipe 80000280 doesn\u0027t match bRequestType c0\nWARNING: CPU: 0 PID: 4645 at drivers/usb/core/urb.c:411\nusb_submit_urb+0x14a7/0x1880 drivers/usb/core/urb.c:411\nModules linked in:\nCPU: 1 PID: 4645 Comm: dhcpcd Not tainted\n6.2.0-rc6-syzkaller-00050-g9f266ccaa2f5 #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google\n01/12/2023\nRIP: 0010:usb_submit_urb+0x14a7/0x1880 drivers/usb/core/urb.c:411\n...\nCall Trace:\n \u003cTASK\u003e\n usb_start_wait_urb+0x101/0x4b0 drivers/usb/core/message.c:58\n usb_internal_control_msg drivers/usb/core/message.c:102 [inline]\n usb_control_msg+0x320/0x4a0 drivers/usb/core/message.c:153\n __usbnet_read_cmd+0xb9/0x390 drivers/net/usb/usbnet.c:2010\n usbnet_read_cmd+0x96/0xf0 drivers/net/usb/usbnet.c:2068\n pl_vendor_req drivers/net/usb/plusb.c:60 [inline]\n pl_set_QuickLink_features drivers/net/usb/plusb.c:75 [inline]\n pl_reset+0x2f/0xf0 drivers/net/usb/plusb.c:85\n usbnet_open+0xcc/0x5d0 drivers/net/usb/usbnet.c:889\n __dev_open+0x297/0x4d0 net/core/dev.c:1417\n __dev_change_flags+0x587/0x750 net/core/dev.c:8530\n dev_change_flags+0x97/0x170 net/core/dev.c:8602\n devinet_ioctl+0x15a2/0x1d70 net/ipv4/devinet.c:1147\n inet_ioctl+0x33f/0x380 net/ipv4/af_inet.c:979\n sock_do_ioctl+0xcc/0x230 net/socket.c:1169\n sock_ioctl+0x1f8/0x680 net/socket.c:1286\n vfs_ioctl fs/ioctl.c:51 [inline]\n __do_sys_ioctl fs/ioctl.c:870 [inline]\n __se_sys_ioctl fs/ioctl.c:856 [inline]\n __x64_sys_ioctl+0x197/0x210 fs/ioctl.c:856\n do_syscall_x64 arch/x86/entry/common.c:50 [inline]\n do_syscall_64+0x39/0xb0 arch/x86/entry/common.c:80\n entry_SYSCALL_64_after_hwframe+0x63/0xcd\n\nThe fix is to call usbnet_write_cmd() instead of usbnet_read_cmd() and\nremove the USB_DIR_IN flag.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-52742",
          "url": "https://www.suse.com/security/cve/CVE-2023-52742"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1225482 for CVE-2023-52742",
          "url": "https://bugzilla.suse.com/1225482"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-11T07:41:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-52742"
    },
    {
      "cve": "CVE-2023-52747",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-52747"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nIB/hfi1: Restore allocated resources on failed copyout\n\nFix a resource leak if an error occurs.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-52747",
          "url": "https://www.suse.com/security/cve/CVE-2023-52747"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1224931 for CVE-2023-52747",
          "url": "https://bugzilla.suse.com/1224931"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-11T07:41:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-52747"
    },
    {
      "cve": "CVE-2023-52759",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-52759"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-52759",
          "url": "https://www.suse.com/security/cve/CVE-2023-52759"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1225560 for CVE-2023-52759",
          "url": "https://bugzilla.suse.com/1225560"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-11T07:41:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-52759"
    },
    {
      "cve": "CVE-2023-52774",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-52774"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ns390/dasd: protect device queue against concurrent access\n\nIn dasd_profile_start() the amount of requests on the device queue are\ncounted. The access to the device queue is unprotected against\nconcurrent access. With a lot of parallel I/O, especially with alias\ndevices enabled, the device queue can change while dasd_profile_start()\nis accessing the queue. In the worst case this leads to a kernel panic\ndue to incorrect pointer accesses.\n\nFix this by taking the device lock before accessing the queue and\ncounting the requests. Additionally the check for a valid profile data\npointer can be done earlier to avoid unnecessary locking in a hot path.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-52774",
          "url": "https://www.suse.com/security/cve/CVE-2023-52774"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1225572 for CVE-2023-52774",
          "url": "https://bugzilla.suse.com/1225572"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-11T07:41:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-52774"
    },
    {
      "cve": "CVE-2023-52781",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-52781"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: config: fix iteration issue in \u0027usb_get_bos_descriptor()\u0027\n\nThe BOS descriptor defines a root descriptor and is the base descriptor for\naccessing a family of related descriptors.\n\nFunction \u0027usb_get_bos_descriptor()\u0027 encounters an iteration issue when\nskipping the \u0027USB_DT_DEVICE_CAPABILITY\u0027 descriptor type. This results in\nthe same descriptor being read repeatedly.\n\nTo address this issue, a \u0027goto\u0027 statement is introduced to ensure that the\npointer and the amount read is updated correctly. This ensures that the\nfunction iterates to the next descriptor instead of reading the same\ndescriptor repeatedly.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-52781",
          "url": "https://www.suse.com/security/cve/CVE-2023-52781"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1225092 for CVE-2023-52781",
          "url": "https://bugzilla.suse.com/1225092"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-11T07:41:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-52781"
    },
    {
      "cve": "CVE-2023-52796",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-52796"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipvlan: add ipvlan_route_v6_outbound() helper\n\nInspired by syzbot reports using a stack of multiple ipvlan devices.\n\nReduce stack size needed in ipvlan_process_v6_outbound() by moving\nthe flowi6 struct used for the route lookup in an non inlined\nhelper. ipvlan_route_v6_outbound() needs 120 bytes on the stack,\nimmediately reclaimed.\n\nAlso make sure ipvlan_process_v4_outbound() is not inlined.\n\nWe might also have to lower MAX_NEST_DEV, because only syzbot uses\nsetups with more than four stacked devices.\n\nBUG: TASK stack guard page was hit at ffffc9000e803ff8 (stack is ffffc9000e804000..ffffc9000e808000)\nstack guard page: 0000 [#1] SMP KASAN\nCPU: 0 PID: 13442 Comm: syz-executor.4 Not tainted 6.1.52-syzkaller #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/09/2023\nRIP: 0010:kasan_check_range+0x4/0x2a0 mm/kasan/generic.c:188\nCode: 48 01 c6 48 89 c7 e8 db 4e c1 03 31 c0 5d c3 cc 0f 0b eb 02 0f 0b b8 ea ff ff ff 5d c3 cc 00 00 cc cc 00 00 cc cc 55 48 89 e5 \u003c41\u003e 57 41 56 41 55 41 54 53 b0 01 48 85 f6 0f 84 a4 01 00 00 48 89\nRSP: 0018:ffffc9000e804000 EFLAGS: 00010246\nRAX: 0000000000000000 RBX: 0000000000000000 RCX: ffffffff817e5bf2\nRDX: 0000000000000000 RSI: 0000000000000008 RDI: ffffffff887c6568\nRBP: ffffc9000e804000 R08: 0000000000000000 R09: 0000000000000000\nR10: 0000000000000000 R11: dffffc0000000001 R12: 1ffff92001d0080c\nR13: dffffc0000000000 R14: ffffffff87e6b100 R15: 0000000000000000\nFS: 00007fd0c55826c0(0000) GS:ffff8881f6800000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: ffffc9000e803ff8 CR3: 0000000170ef7000 CR4: 00000000003506f0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\nCall Trace:\n\u003c#DF\u003e\n\u003c/#DF\u003e\n\u003cTASK\u003e\n[\u003cffffffff81f281d1\u003e] __kasan_check_read+0x11/0x20 mm/kasan/shadow.c:31\n[\u003cffffffff817e5bf2\u003e] instrument_atomic_read include/linux/instrumented.h:72 [inline]\n[\u003cffffffff817e5bf2\u003e] _test_bit include/asm-generic/bitops/instrumented-non-atomic.h:141 [inline]\n[\u003cffffffff817e5bf2\u003e] cpumask_test_cpu include/linux/cpumask.h:506 [inline]\n[\u003cffffffff817e5bf2\u003e] cpu_online include/linux/cpumask.h:1092 [inline]\n[\u003cffffffff817e5bf2\u003e] trace_lock_acquire include/trace/events/lock.h:24 [inline]\n[\u003cffffffff817e5bf2\u003e] lock_acquire+0xe2/0x590 kernel/locking/lockdep.c:5632\n[\u003cffffffff8563221e\u003e] rcu_lock_acquire+0x2e/0x40 include/linux/rcupdate.h:306\n[\u003cffffffff8561464d\u003e] rcu_read_lock include/linux/rcupdate.h:747 [inline]\n[\u003cffffffff8561464d\u003e] ip6_pol_route+0x15d/0x1440 net/ipv6/route.c:2221\n[\u003cffffffff85618120\u003e] ip6_pol_route_output+0x50/0x80 net/ipv6/route.c:2606\n[\u003cffffffff856f65b5\u003e] pol_lookup_func include/net/ip6_fib.h:584 [inline]\n[\u003cffffffff856f65b5\u003e] fib6_rule_lookup+0x265/0x620 net/ipv6/fib6_rules.c:116\n[\u003cffffffff85618009\u003e] ip6_route_output_flags_noref+0x2d9/0x3a0 net/ipv6/route.c:2638\n[\u003cffffffff8561821a\u003e] ip6_route_output_flags+0xca/0x340 net/ipv6/route.c:2651\n[\u003cffffffff838bd5a3\u003e] ip6_route_output include/net/ip6_route.h:100 [inline]\n[\u003cffffffff838bd5a3\u003e] ipvlan_process_v6_outbound drivers/net/ipvlan/ipvlan_core.c:473 [inline]\n[\u003cffffffff838bd5a3\u003e] ipvlan_process_outbound drivers/net/ipvlan/ipvlan_core.c:529 [inline]\n[\u003cffffffff838bd5a3\u003e] ipvlan_xmit_mode_l3 drivers/net/ipvlan/ipvlan_core.c:602 [inline]\n[\u003cffffffff838bd5a3\u003e] ipvlan_queue_xmit+0xc33/0x1be0 drivers/net/ipvlan/ipvlan_core.c:677\n[\u003cffffffff838c2909\u003e] ipvlan_start_xmit+0x49/0x100 drivers/net/ipvlan/ipvlan_main.c:229\n[\u003cffffffff84d03900\u003e] netdev_start_xmit include/linux/netdevice.h:4966 [inline]\n[\u003cffffffff84d03900\u003e] xmit_one net/core/dev.c:3644 [inline]\n[\u003cffffffff84d03900\u003e] dev_hard_start_xmit+0x320/0x980 net/core/dev.c:3660\n[\u003cffffffff84d080e2\u003e] __dev_queue_xmit+0x16b2/0x3370 net/core/dev.c:4324\n[\u003cffffffff855ce4cd\u003e] dev_queue_xmit include/linux/netdevice.h:3067 [inline]\n[\u003cffffffff855ce4cd\u003e] neigh_hh_output include/net/neighbour.h:529 [inline]\n[\u003cf\n---truncated---",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-52796",
          "url": "https://www.suse.com/security/cve/CVE-2023-52796"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1224930 for CVE-2023-52796",
          "url": "https://bugzilla.suse.com/1224930"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-11T07:41:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-52796"
    },
    {
      "cve": "CVE-2023-52803",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-52803"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nSUNRPC: Fix RPC client cleaned up the freed pipefs dentries\n\nRPC client pipefs dentries cleanup is in separated rpc_remove_pipedir()\nworkqueue,which takes care about pipefs superblock locking.\nIn some special scenarios, when kernel frees the pipefs sb of the\ncurrent client and immediately alloctes a new pipefs sb,\nrpc_remove_pipedir function would misjudge the existence of pipefs\nsb which is not the one it used to hold. As a result,\nthe rpc_remove_pipedir would clean the released freed pipefs dentries.\n\nTo fix this issue, rpc_remove_pipedir should check whether the\ncurrent pipefs sb is consistent with the original pipefs sb.\n\nThis error can be catched by KASAN:\n=========================================================\n[  250.497700] BUG: KASAN: slab-use-after-free in dget_parent+0x195/0x200\n[  250.498315] Read of size 4 at addr ffff88800a2ab804 by task kworker/0:18/106503\n[  250.500549] Workqueue: events rpc_free_client_work\n[  250.501001] Call Trace:\n[  250.502880]  kasan_report+0xb6/0xf0\n[  250.503209]  ? dget_parent+0x195/0x200\n[  250.503561]  dget_parent+0x195/0x200\n[  250.503897]  ? __pfx_rpc_clntdir_depopulate+0x10/0x10\n[  250.504384]  rpc_rmdir_depopulate+0x1b/0x90\n[  250.504781]  rpc_remove_client_dir+0xf5/0x150\n[  250.505195]  rpc_free_client_work+0xe4/0x230\n[  250.505598]  process_one_work+0x8ee/0x13b0\n...\n[   22.039056] Allocated by task 244:\n[   22.039390]  kasan_save_stack+0x22/0x50\n[   22.039758]  kasan_set_track+0x25/0x30\n[   22.040109]  __kasan_slab_alloc+0x59/0x70\n[   22.040487]  kmem_cache_alloc_lru+0xf0/0x240\n[   22.040889]  __d_alloc+0x31/0x8e0\n[   22.041207]  d_alloc+0x44/0x1f0\n[   22.041514]  __rpc_lookup_create_exclusive+0x11c/0x140\n[   22.041987]  rpc_mkdir_populate.constprop.0+0x5f/0x110\n[   22.042459]  rpc_create_client_dir+0x34/0x150\n[   22.042874]  rpc_setup_pipedir_sb+0x102/0x1c0\n[   22.043284]  rpc_client_register+0x136/0x4e0\n[   22.043689]  rpc_new_client+0x911/0x1020\n[   22.044057]  rpc_create_xprt+0xcb/0x370\n[   22.044417]  rpc_create+0x36b/0x6c0\n...\n[   22.049524] Freed by task 0:\n[   22.049803]  kasan_save_stack+0x22/0x50\n[   22.050165]  kasan_set_track+0x25/0x30\n[   22.050520]  kasan_save_free_info+0x2b/0x50\n[   22.050921]  __kasan_slab_free+0x10e/0x1a0\n[   22.051306]  kmem_cache_free+0xa5/0x390\n[   22.051667]  rcu_core+0x62c/0x1930\n[   22.051995]  __do_softirq+0x165/0x52a\n[   22.052347]\n[   22.052503] Last potentially related work creation:\n[   22.052952]  kasan_save_stack+0x22/0x50\n[   22.053313]  __kasan_record_aux_stack+0x8e/0xa0\n[   22.053739]  __call_rcu_common.constprop.0+0x6b/0x8b0\n[   22.054209]  dentry_free+0xb2/0x140\n[   22.054540]  __dentry_kill+0x3be/0x540\n[   22.054900]  shrink_dentry_list+0x199/0x510\n[   22.055293]  shrink_dcache_parent+0x190/0x240\n[   22.055703]  do_one_tree+0x11/0x40\n[   22.056028]  shrink_dcache_for_umount+0x61/0x140\n[   22.056461]  generic_shutdown_super+0x70/0x590\n[   22.056879]  kill_anon_super+0x3a/0x60\n[   22.057234]  rpc_kill_sb+0x121/0x200",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-52803",
          "url": "https://www.suse.com/security/cve/CVE-2023-52803"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1225008 for CVE-2023-52803",
          "url": "https://bugzilla.suse.com/1225008"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-11T07:41:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-52803"
    },
    {
      "cve": "CVE-2023-52821",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-52821"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/panel: fix a possible null pointer dereference\n\nIn versatile_panel_get_modes(), the return value of drm_mode_duplicate()\nis assigned to mode, which will lead to a NULL pointer dereference\non failure of drm_mode_duplicate(). Add a check to avoid npd.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-52821",
          "url": "https://www.suse.com/security/cve/CVE-2023-52821"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1225022 for CVE-2023-52821",
          "url": "https://bugzilla.suse.com/1225022"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-11T07:41:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-52821"
    },
    {
      "cve": "CVE-2023-52864",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-52864"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nplatform/x86: wmi: Fix opening of char device\n\nSince commit fa1f68db6ca7 (\"drivers: misc: pass miscdevice pointer via\nfile private data\"), the miscdevice stores a pointer to itself inside\nfilp-\u003eprivate_data, which means that private_data will not be NULL when\nwmi_char_open() is called. This might cause memory corruption should\nwmi_char_open() be unable to find its driver, something which can\nhappen when the associated WMI device is deleted in wmi_free_devices().\n\nFix the problem by using the miscdevice pointer to retrieve the WMI\ndevice data associated with a char device using container_of(). This\nalso avoids wmi_char_open() picking a wrong WMI device bound to a\ndriver with the same name as the original driver.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-52864",
          "url": "https://www.suse.com/security/cve/CVE-2023-52864"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1225132 for CVE-2023-52864",
          "url": "https://bugzilla.suse.com/1225132"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-11T07:41:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-52864"
    },
    {
      "cve": "CVE-2023-52865",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-52865"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nclk: mediatek: clk-mt6797: Add check for mtk_alloc_clk_data\n\nAdd the check for the return value of mtk_alloc_clk_data() in order to\navoid NULL pointer dereference.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-52865",
          "url": "https://www.suse.com/security/cve/CVE-2023-52865"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1225086 for CVE-2023-52865",
          "url": "https://bugzilla.suse.com/1225086"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-11T07:41:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-52865"
    },
    {
      "cve": "CVE-2023-52867",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-52867"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/radeon: possible buffer overflow\n\nBuffer \u0027afmt_status\u0027 of size 6 could overflow, since index \u0027afmt_idx\u0027 is\nchecked after access.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-52867",
          "url": "https://www.suse.com/security/cve/CVE-2023-52867"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1225009 for CVE-2023-52867",
          "url": "https://bugzilla.suse.com/1225009"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-11T07:41:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-52867"
    },
    {
      "cve": "CVE-2023-52875",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-52875"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nclk: mediatek: clk-mt2701: Add check for mtk_alloc_clk_data\n\nAdd the check for the return value of mtk_alloc_clk_data() in order to\navoid NULL pointer dereference.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-52875",
          "url": "https://www.suse.com/security/cve/CVE-2023-52875"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1225096 for CVE-2023-52875",
          "url": "https://bugzilla.suse.com/1225096"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-11T07:41:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-52875"
    },
    {
      "cve": "CVE-2023-52880",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-52880"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntty: n_gsm: require CAP_NET_ADMIN to attach N_GSM0710 ldisc\n\nAny unprivileged user can attach N_GSM0710 ldisc, but it requires\nCAP_NET_ADMIN to create a GSM network anyway.\n\nRequire initial namespace CAP_NET_ADMIN to do that.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-52880",
          "url": "https://www.suse.com/security/cve/CVE-2023-52880"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222619 for CVE-2023-52880",
          "url": "https://bugzilla.suse.com/1222619"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.4,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-11T07:41:39Z",
          "details": "important"
        }
      ],
      "title": "CVE-2023-52880"
    },
    {
      "cve": "CVE-2024-26625",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26625"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nllc: call sock_orphan() at release time\n\nsyzbot reported an interesting trace [1] caused by a stale sk-\u003esk_wq\npointer in a closed llc socket.\n\nIn commit ff7b11aa481f (\"net: socket: set sock-\u003esk to NULL after\ncalling proto_ops::release()\") Eric Biggers hinted that some protocols\nare missing a sock_orphan(), we need to perform a full audit.\n\nIn net-next, I plan to clear sock-\u003esk from sock_orphan() and\namend Eric patch to add a warning.\n\n[1]\n BUG: KASAN: slab-use-after-free in list_empty include/linux/list.h:373 [inline]\n BUG: KASAN: slab-use-after-free in waitqueue_active include/linux/wait.h:127 [inline]\n BUG: KASAN: slab-use-after-free in sock_def_write_space_wfree net/core/sock.c:3384 [inline]\n BUG: KASAN: slab-use-after-free in sock_wfree+0x9a8/0x9d0 net/core/sock.c:2468\nRead of size 8 at addr ffff88802f4fc880 by task ksoftirqd/1/27\n\nCPU: 1 PID: 27 Comm: ksoftirqd/1 Not tainted 6.8.0-rc1-syzkaller-00049-g6098d87eaf31 #0\nHardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.2-debian-1.16.2-1 04/01/2014\nCall Trace:\n \u003cTASK\u003e\n  __dump_stack lib/dump_stack.c:88 [inline]\n  dump_stack_lvl+0xd9/0x1b0 lib/dump_stack.c:106\n  print_address_description mm/kasan/report.c:377 [inline]\n  print_report+0xc4/0x620 mm/kasan/report.c:488\n  kasan_report+0xda/0x110 mm/kasan/report.c:601\n  list_empty include/linux/list.h:373 [inline]\n  waitqueue_active include/linux/wait.h:127 [inline]\n  sock_def_write_space_wfree net/core/sock.c:3384 [inline]\n  sock_wfree+0x9a8/0x9d0 net/core/sock.c:2468\n  skb_release_head_state+0xa3/0x2b0 net/core/skbuff.c:1080\n  skb_release_all net/core/skbuff.c:1092 [inline]\n  napi_consume_skb+0x119/0x2b0 net/core/skbuff.c:1404\n  e1000_unmap_and_free_tx_resource+0x144/0x200 drivers/net/ethernet/intel/e1000/e1000_main.c:1970\n  e1000_clean_tx_irq drivers/net/ethernet/intel/e1000/e1000_main.c:3860 [inline]\n  e1000_clean+0x4a1/0x26e0 drivers/net/ethernet/intel/e1000/e1000_main.c:3801\n  __napi_poll.constprop.0+0xb4/0x540 net/core/dev.c:6576\n  napi_poll net/core/dev.c:6645 [inline]\n  net_rx_action+0x956/0xe90 net/core/dev.c:6778\n  __do_softirq+0x21a/0x8de kernel/softirq.c:553\n  run_ksoftirqd kernel/softirq.c:921 [inline]\n  run_ksoftirqd+0x31/0x60 kernel/softirq.c:913\n  smpboot_thread_fn+0x660/0xa10 kernel/smpboot.c:164\n  kthread+0x2c6/0x3a0 kernel/kthread.c:388\n  ret_from_fork+0x45/0x80 arch/x86/kernel/process.c:147\n  ret_from_fork_asm+0x11/0x20 arch/x86/entry/entry_64.S:242\n \u003c/TASK\u003e\n\nAllocated by task 5167:\n  kasan_save_stack+0x33/0x50 mm/kasan/common.c:47\n  kasan_save_track+0x14/0x30 mm/kasan/common.c:68\n  unpoison_slab_object mm/kasan/common.c:314 [inline]\n  __kasan_slab_alloc+0x81/0x90 mm/kasan/common.c:340\n  kasan_slab_alloc include/linux/kasan.h:201 [inline]\n  slab_post_alloc_hook mm/slub.c:3813 [inline]\n  slab_alloc_node mm/slub.c:3860 [inline]\n  kmem_cache_alloc_lru+0x142/0x6f0 mm/slub.c:3879\n  alloc_inode_sb include/linux/fs.h:3019 [inline]\n  sock_alloc_inode+0x25/0x1c0 net/socket.c:308\n  alloc_inode+0x5d/0x220 fs/inode.c:260\n  new_inode_pseudo+0x16/0x80 fs/inode.c:1005\n  sock_alloc+0x40/0x270 net/socket.c:634\n  __sock_create+0xbc/0x800 net/socket.c:1535\n  sock_create net/socket.c:1622 [inline]\n  __sys_socket_create net/socket.c:1659 [inline]\n  __sys_socket+0x14c/0x260 net/socket.c:1706\n  __do_sys_socket net/socket.c:1720 [inline]\n  __se_sys_socket net/socket.c:1718 [inline]\n  __x64_sys_socket+0x72/0xb0 net/socket.c:1718\n  do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n  do_syscall_64+0xd3/0x250 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x63/0x6b\n\nFreed by task 0:\n  kasan_save_stack+0x33/0x50 mm/kasan/common.c:47\n  kasan_save_track+0x14/0x30 mm/kasan/common.c:68\n  kasan_save_free_info+0x3f/0x60 mm/kasan/generic.c:640\n  poison_slab_object mm/kasan/common.c:241 [inline]\n  __kasan_slab_free+0x121/0x1b0 mm/kasan/common.c:257\n  kasan_slab_free include/linux/kasan.h:184 [inline]\n  slab_free_hook mm/slub.c:2121 [inlin\n---truncated---",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26625",
          "url": "https://www.suse.com/security/cve/CVE-2024-26625"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1221086 for CVE-2024-26625",
          "url": "https://bugzilla.suse.com/1221086"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-11T07:41:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26625"
    },
    {
      "cve": "CVE-2024-26752",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26752"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nl2tp: pass correct message length to ip6_append_data\n\nl2tp_ip6_sendmsg needs to avoid accounting for the transport header\ntwice when splicing more data into an already partially-occupied skbuff.\n\nTo manage this, we check whether the skbuff contains data using\nskb_queue_empty when deciding how much data to append using\nip6_append_data.\n\nHowever, the code which performed the calculation was incorrect:\n\n     ulen = len + skb_queue_empty(\u0026sk-\u003esk_write_queue) ? transhdrlen : 0;\n\n...due to C operator precedence, this ends up setting ulen to\ntranshdrlen for messages with a non-zero length, which results in\ncorrupted packets on the wire.\n\nAdd parentheses to correct the calculation in line with the original\nintent.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26752",
          "url": "https://www.suse.com/security/cve/CVE-2024-26752"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222667 for CVE-2024-26752",
          "url": "https://bugzilla.suse.com/1222667"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223292 for CVE-2024-26752",
          "url": "https://bugzilla.suse.com/1223292"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-11T07:41:39Z",
          "details": "important"
        }
      ],
      "title": "CVE-2024-26752"
    },
    {
      "cve": "CVE-2024-26775",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26775"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\naoe: avoid potential deadlock at set_capacity\n\nMove set_capacity() outside of the section procected by (\u0026d-\u003elock).\nTo avoid possible interrupt unsafe locking scenario:\n\n        CPU0                    CPU1\n        ----                    ----\n[1] lock(\u0026bdev-\u003ebd_size_lock);\n                                local_irq_disable();\n                            [2] lock(\u0026d-\u003elock);\n                            [3] lock(\u0026bdev-\u003ebd_size_lock);\n   \u003cInterrupt\u003e\n[4]  lock(\u0026d-\u003elock);\n\n  *** DEADLOCK ***\n\nWhere [1](\u0026bdev-\u003ebd_size_lock) hold by zram_add()-\u003eset_capacity().\n[2]lock(\u0026d-\u003elock) hold by aoeblk_gdalloc(). And aoeblk_gdalloc()\nis trying to acquire [3](\u0026bdev-\u003ebd_size_lock) at set_capacity() call.\nIn this situation an attempt to acquire [4]lock(\u0026d-\u003elock) from\naoecmd_cfg_rsp() will lead to deadlock.\n\nSo the simplest solution is breaking lock dependency\n[2](\u0026d-\u003elock) -\u003e [3](\u0026bdev-\u003ebd_size_lock) by moving set_capacity()\noutside.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26775",
          "url": "https://www.suse.com/security/cve/CVE-2024-26775"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222627 for CVE-2024-26775",
          "url": "https://bugzilla.suse.com/1222627"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-11T07:41:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26775"
    },
    {
      "cve": "CVE-2024-26828",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26828"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncifs: fix underflow in parse_server_interfaces()\n\nIn this loop, we step through the buffer and after each item we check\nif the size_left is greater than the minimum size we need.  However,\nthe problem is that \"bytes_left\" is type ssize_t while sizeof() is type\nsize_t.  That means that because of type promotion, the comparison is\ndone as an unsigned and if we have negative bytes left the loop\ncontinues instead of ending.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26828",
          "url": "https://www.suse.com/security/cve/CVE-2024-26828"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223084 for CVE-2024-26828",
          "url": "https://bugzilla.suse.com/1223084"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223363 for CVE-2024-26828",
          "url": "https://bugzilla.suse.com/1223363"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-11T07:41:39Z",
          "details": "important"
        }
      ],
      "title": "CVE-2024-26828"
    },
    {
      "cve": "CVE-2024-26846",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26846"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnvme-fc: do not wait in vain when unloading module\n\nThe module exit path has race between deleting all controllers and\nfreeing \u0027left over IDs\u0027. To prevent double free a synchronization\nbetween nvme_delete_ctrl and ida_destroy has been added by the initial\ncommit.\n\nThere is some logic around trying to prevent from hanging forever in\nwait_for_completion, though it does not handling all cases. E.g.\nblktests is able to reproduce the situation where the module unload\nhangs forever.\n\nIf we completely rely on the cleanup code executed from the\nnvme_delete_ctrl path, all IDs will be freed eventually. This makes\ncalling ida_destroy unnecessary. We only have to ensure that all\nnvme_delete_ctrl code has been executed before we leave\nnvme_fc_exit_module. This is done by flushing the nvme_delete_wq\nworkqueue.\n\nWhile at it, remove the unused nvme_fc_wq workqueue too.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26846",
          "url": "https://www.suse.com/security/cve/CVE-2024-26846"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223023 for CVE-2024-26846",
          "url": "https://bugzilla.suse.com/1223023"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-11T07:41:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26846"
    },
    {
      "cve": "CVE-2024-26874",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26874"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/mediatek: Fix a null pointer crash in mtk_drm_crtc_finish_page_flip\n\nIt\u0027s possible that mtk_crtc-\u003eevent is NULL in\nmtk_drm_crtc_finish_page_flip().\n\npending_needs_vblank value is set by mtk_crtc-\u003eevent, but in\nmtk_drm_crtc_atomic_flush(), it\u0027s is not guarded by the same\nlock in mtk_drm_finish_page_flip(), thus a race condition happens.\n\nConsider the following case:\n\nCPU1                              CPU2\nstep 1:\nmtk_drm_crtc_atomic_begin()\nmtk_crtc-\u003eevent is not null,\n                                  step 1:\n                                  mtk_drm_crtc_atomic_flush:\n                                  mtk_drm_crtc_update_config(\n                                      !!mtk_crtc-\u003eevent)\nstep 2:\nmtk_crtc_ddp_irq -\u003e\nmtk_drm_finish_page_flip:\nlock\nmtk_crtc-\u003eevent set to null,\npending_needs_vblank set to false\nunlock\n                                  pending_needs_vblank set to true,\n\n                                  step 2:\n                                  mtk_crtc_ddp_irq -\u003e\n                                  mtk_drm_finish_page_flip called again,\n                                  pending_needs_vblank is still true\n                                  //null pointer\n\nInstead of guarding the entire mtk_drm_crtc_atomic_flush(), it\u0027s more\nefficient to just check if mtk_crtc-\u003eevent is null before use.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26874",
          "url": "https://www.suse.com/security/cve/CVE-2024-26874"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223048 for CVE-2024-26874",
          "url": "https://bugzilla.suse.com/1223048"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-11T07:41:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26874"
    },
    {
      "cve": "CVE-2024-26900",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26900"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmd: fix kmemleak of rdev-\u003eserial\n\nIf kobject_add() is fail in bind_rdev_to_array(), \u0027rdev-\u003eserial\u0027 will be\nalloc not be freed, and kmemleak occurs.\n\nunreferenced object 0xffff88815a350000 (size 49152):\n  comm \"mdadm\", pid 789, jiffies 4294716910\n  hex dump (first 32 bytes):\n    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................\n    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................\n  backtrace (crc f773277a):\n    [\u003c0000000058b0a453\u003e] kmemleak_alloc+0x61/0xe0\n    [\u003c00000000366adf14\u003e] __kmalloc_large_node+0x15e/0x270\n    [\u003c000000002e82961b\u003e] __kmalloc_node.cold+0x11/0x7f\n    [\u003c00000000f206d60a\u003e] kvmalloc_node+0x74/0x150\n    [\u003c0000000034bf3363\u003e] rdev_init_serial+0x67/0x170\n    [\u003c0000000010e08fe9\u003e] mddev_create_serial_pool+0x62/0x220\n    [\u003c00000000c3837bf0\u003e] bind_rdev_to_array+0x2af/0x630\n    [\u003c0000000073c28560\u003e] md_add_new_disk+0x400/0x9f0\n    [\u003c00000000770e30ff\u003e] md_ioctl+0x15bf/0x1c10\n    [\u003c000000006cfab718\u003e] blkdev_ioctl+0x191/0x3f0\n    [\u003c0000000085086a11\u003e] vfs_ioctl+0x22/0x60\n    [\u003c0000000018b656fe\u003e] __x64_sys_ioctl+0xba/0xe0\n    [\u003c00000000e54e675e\u003e] do_syscall_64+0x71/0x150\n    [\u003c000000008b0ad622\u003e] entry_SYSCALL_64_after_hwframe+0x6c/0x74",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26900",
          "url": "https://www.suse.com/security/cve/CVE-2024-26900"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223046 for CVE-2024-26900",
          "url": "https://bugzilla.suse.com/1223046"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-11T07:41:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26900"
    },
    {
      "cve": "CVE-2024-26915",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26915"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amdgpu: Reset IH OVERFLOW_CLEAR bit\n\nAllows us to detect subsequent IH ring buffer overflows as well.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26915",
          "url": "https://www.suse.com/security/cve/CVE-2024-26915"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223207 for CVE-2024-26915",
          "url": "https://bugzilla.suse.com/1223207"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-11T07:41:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26915"
    },
    {
      "cve": "CVE-2024-26920",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26920"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntracing/trigger: Fix to return error if failed to alloc snapshot\n\nFix register_snapshot_trigger() to return error code if it failed to\nallocate a snapshot instead of 0 (success). Unless that, it will register\nsnapshot trigger without an error.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26920",
          "url": "https://www.suse.com/security/cve/CVE-2024-26920"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1228237 for CVE-2024-26920",
          "url": "https://bugzilla.suse.com/1228237"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-11T07:41:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26920"
    },
    {
      "cve": "CVE-2024-26921",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26921"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ninet: inet_defrag: prevent sk release while still in use\n\nip_local_out() and other functions can pass skb-\u003esk as function argument.\n\nIf the skb is a fragment and reassembly happens before such function call\nreturns, the sk must not be released.\n\nThis affects skb fragments reassembled via netfilter or similar\nmodules, e.g. openvswitch or ct_act.c, when run as part of tx pipeline.\n\nEric Dumazet made an initial analysis of this bug.  Quoting Eric:\n  Calling ip_defrag() in output path is also implying skb_orphan(),\n  which is buggy because output path relies on sk not disappearing.\n\n  A relevant old patch about the issue was :\n  8282f27449bf (\"inet: frag: Always orphan skbs inside ip_defrag()\")\n\n  [..]\n\n  net/ipv4/ip_output.c depends on skb-\u003esk being set, and probably to an\n  inet socket, not an arbitrary one.\n\n  If we orphan the packet in ipvlan, then downstream things like FQ\n  packet scheduler will not work properly.\n\n  We need to change ip_defrag() to only use skb_orphan() when really\n  needed, ie whenever frag_list is going to be used.\n\nEric suggested to stash sk in fragment queue and made an initial patch.\nHowever there is a problem with this:\n\nIf skb is refragmented again right after, ip_do_fragment() will copy\nhead-\u003esk to the new fragments, and sets up destructor to sock_wfree.\nIOW, we have no choice but to fix up sk_wmem accouting to reflect the\nfully reassembled skb, else wmem will underflow.\n\nThis change moves the orphan down into the core, to last possible moment.\nAs ip_defrag_offset is aliased with sk_buff-\u003esk member, we must move the\noffset into the FRAG_CB, else skb-\u003esk gets clobbered.\n\nThis allows to delay the orphaning long enough to learn if the skb has\nto be queued or if the skb is completing the reasm queue.\n\nIn the former case, things work as before, skb is orphaned.  This is\nsafe because skb gets queued/stolen and won\u0027t continue past reasm engine.\n\nIn the latter case, we will steal the skb-\u003esk reference, reattach it to\nthe head skb, and fix up wmem accouting when inet_frag inflates truesize.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26921",
          "url": "https://www.suse.com/security/cve/CVE-2024-26921"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223138 for CVE-2024-26921",
          "url": "https://bugzilla.suse.com/1223138"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223139 for CVE-2024-26921",
          "url": "https://bugzilla.suse.com/1223139"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.6,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-11T07:41:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26921"
    },
    {
      "cve": "CVE-2024-26934",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26934"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nUSB: core: Fix deadlock in usb_deauthorize_interface()\n\nAmong the attribute file callback routines in\ndrivers/usb/core/sysfs.c, the interface_authorized_store() function is\nthe only one which acquires a device lock on an ancestor device: It\ncalls usb_deauthorize_interface(), which locks the interface\u0027s parent\nUSB device.\n\nThe will lead to deadlock if another process already owns that lock\nand tries to remove the interface, whether through a configuration\nchange or because the device has been disconnected.  As part of the\nremoval procedure, device_del() waits for all ongoing sysfs attribute\ncallbacks to complete.  But usb_deauthorize_interface() can\u0027t complete\nuntil the device lock has been released, and the lock won\u0027t be\nreleased until the removal has finished.\n\nThe mechanism provided by sysfs to prevent this kind of deadlock is\nto use the sysfs_break_active_protection() function, which tells sysfs\nnot to wait for the attribute callback.\n\nReported-and-tested by: Yue Sun \u003csamsun1006219@gmail.com\u003e\nReported by: xingwei lee \u003cxrivendell7@gmail.com\u003e",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26934",
          "url": "https://www.suse.com/security/cve/CVE-2024-26934"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223671 for CVE-2024-26934",
          "url": "https://bugzilla.suse.com/1223671"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-11T07:41:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26934"
    },
    {
      "cve": "CVE-2024-26957",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26957"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ns390/zcrypt: fix reference counting on zcrypt card objects\n\nTests with hot-plugging crytpo cards on KVM guests with debug\nkernel build revealed an use after free for the load field of\nthe struct zcrypt_card. The reason was an incorrect reference\nhandling of the zcrypt card object which could lead to a free\nof the zcrypt card object while it was still in use.\n\nThis is an example of the slab message:\n\n    kernel: 0x00000000885a7512-0x00000000885a7513 @offset=1298. First byte 0x68 instead of 0x6b\n    kernel: Allocated in zcrypt_card_alloc+0x36/0x70 [zcrypt] age=18046 cpu=3 pid=43\n    kernel:  kmalloc_trace+0x3f2/0x470\n    kernel:  zcrypt_card_alloc+0x36/0x70 [zcrypt]\n    kernel:  zcrypt_cex4_card_probe+0x26/0x380 [zcrypt_cex4]\n    kernel:  ap_device_probe+0x15c/0x290\n    kernel:  really_probe+0xd2/0x468\n    kernel:  driver_probe_device+0x40/0xf0\n    kernel:  __device_attach_driver+0xc0/0x140\n    kernel:  bus_for_each_drv+0x8c/0xd0\n    kernel:  __device_attach+0x114/0x198\n    kernel:  bus_probe_device+0xb4/0xc8\n    kernel:  device_add+0x4d2/0x6e0\n    kernel:  ap_scan_adapter+0x3d0/0x7c0\n    kernel:  ap_scan_bus+0x5a/0x3b0\n    kernel:  ap_scan_bus_wq_callback+0x40/0x60\n    kernel:  process_one_work+0x26e/0x620\n    kernel:  worker_thread+0x21c/0x440\n    kernel: Freed in zcrypt_card_put+0x54/0x80 [zcrypt] age=9024 cpu=3 pid=43\n    kernel:  kfree+0x37e/0x418\n    kernel:  zcrypt_card_put+0x54/0x80 [zcrypt]\n    kernel:  ap_device_remove+0x4c/0xe0\n    kernel:  device_release_driver_internal+0x1c4/0x270\n    kernel:  bus_remove_device+0x100/0x188\n    kernel:  device_del+0x164/0x3c0\n    kernel:  device_unregister+0x30/0x90\n    kernel:  ap_scan_adapter+0xc8/0x7c0\n    kernel:  ap_scan_bus+0x5a/0x3b0\n    kernel:  ap_scan_bus_wq_callback+0x40/0x60\n    kernel:  process_one_work+0x26e/0x620\n    kernel:  worker_thread+0x21c/0x440\n    kernel:  kthread+0x150/0x168\n    kernel:  __ret_from_fork+0x3c/0x58\n    kernel:  ret_from_fork+0xa/0x30\n    kernel: Slab 0x00000372022169c0 objects=20 used=18 fp=0x00000000885a7c88 flags=0x3ffff00000000a00(workingset|slab|node=0|zone=1|lastcpupid=0x1ffff)\n    kernel: Object 0x00000000885a74b8 @offset=1208 fp=0x00000000885a7c88\n    kernel: Redzone  00000000885a74b0: bb bb bb bb bb bb bb bb                          ........\n    kernel: Object   00000000885a74b8: 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b  kkkkkkkkkkkkkkkk\n    kernel: Object   00000000885a74c8: 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b  kkkkkkkkkkkkkkkk\n    kernel: Object   00000000885a74d8: 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b  kkkkkkkkkkkkkkkk\n    kernel: Object   00000000885a74e8: 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b  kkkkkkkkkkkkkkkk\n    kernel: Object   00000000885a74f8: 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b  kkkkkkkkkkkkkkkk\n    kernel: Object   00000000885a7508: 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 68 4b 6b 6b 6b a5  kkkkkkkkkkhKkkk.\n    kernel: Redzone  00000000885a7518: bb bb bb bb bb bb bb bb                          ........\n    kernel: Padding  00000000885a756c: 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a              ZZZZZZZZZZZZ\n    kernel: CPU: 0 PID: 387 Comm: systemd-udevd Not tainted 6.8.0-HF #2\n    kernel: Hardware name: IBM 3931 A01 704 (KVM/Linux)\n    kernel: Call Trace:\n    kernel:  [\u003c00000000ca5ab5b8\u003e] dump_stack_lvl+0x90/0x120\n    kernel:  [\u003c00000000c99d78bc\u003e] check_bytes_and_report+0x114/0x140\n    kernel:  [\u003c00000000c99d53cc\u003e] check_object+0x334/0x3f8\n    kernel:  [\u003c00000000c99d820c\u003e] alloc_debug_processing+0xc4/0x1f8\n    kernel:  [\u003c00000000c99d852e\u003e] get_partial_node.part.0+0x1ee/0x3e0\n    kernel:  [\u003c00000000c99d94ec\u003e] ___slab_alloc+0xaf4/0x13c8\n    kernel:  [\u003c00000000c99d9e38\u003e] __slab_alloc.constprop.0+0x78/0xb8\n    kernel:  [\u003c00000000c99dc8dc\u003e] __kmalloc+0x434/0x590\n    kernel:  [\u003c00000000c9b4c0ce\u003e] ext4_htree_store_dirent+0x4e/0x1c0\n    kernel:  [\u003c00000000c9b908a2\u003e] htree_dirblock_to_tree+0x17a/0x3f0\n    kernel: \n---truncated---",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26957",
          "url": "https://www.suse.com/security/cve/CVE-2024-26957"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223666 for CVE-2024-26957",
          "url": "https://bugzilla.suse.com/1223666"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-11T07:41:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26957"
    },
    {
      "cve": "CVE-2024-26958",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26958"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnfs: fix UAF in direct writes\n\nIn production we have been hitting the following warning consistently\n\n------------[ cut here ]------------\nrefcount_t: underflow; use-after-free.\nWARNING: CPU: 17 PID: 1800359 at lib/refcount.c:28 refcount_warn_saturate+0x9c/0xe0\nWorkqueue: nfsiod nfs_direct_write_schedule_work [nfs]\nRIP: 0010:refcount_warn_saturate+0x9c/0xe0\nPKRU: 55555554\nCall Trace:\n \u003cTASK\u003e\n ? __warn+0x9f/0x130\n ? refcount_warn_saturate+0x9c/0xe0\n ? report_bug+0xcc/0x150\n ? handle_bug+0x3d/0x70\n ? exc_invalid_op+0x16/0x40\n ? asm_exc_invalid_op+0x16/0x20\n ? refcount_warn_saturate+0x9c/0xe0\n nfs_direct_write_schedule_work+0x237/0x250 [nfs]\n process_one_work+0x12f/0x4a0\n worker_thread+0x14e/0x3b0\n ? ZSTD_getCParams_internal+0x220/0x220\n kthread+0xdc/0x120\n ? __btf_name_valid+0xa0/0xa0\n ret_from_fork+0x1f/0x30\n\nThis is because we\u0027re completing the nfs_direct_request twice in a row.\n\nThe source of this is when we have our commit requests to submit, we\nprocess them and send them off, and then in the completion path for the\ncommit requests we have\n\nif (nfs_commit_end(cinfo.mds))\n\tnfs_direct_write_complete(dreq);\n\nHowever since we\u0027re submitting asynchronous requests we sometimes have\none that completes before we submit the next one, so we end up calling\ncomplete on the nfs_direct_request twice.\n\nThe only other place we use nfs_generic_commit_list() is in\n__nfs_commit_inode, which wraps this call in a\n\nnfs_commit_begin();\nnfs_commit_end();\n\nWhich is a common pattern for this style of completion handling, one\nthat is also repeated in the direct code with get_dreq()/put_dreq()\ncalls around where we process events as well as in the completion paths.\n\nFix this by using the same pattern for the commit requests.\n\nBefore with my 200 node rocksdb stress running this warning would pop\nevery 10ish minutes.  With my patch the stress test has been running for\nseveral hours without popping.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26958",
          "url": "https://www.suse.com/security/cve/CVE-2024-26958"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223653 for CVE-2024-26958",
          "url": "https://bugzilla.suse.com/1223653"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-11T07:41:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26958"
    },
    {
      "cve": "CVE-2024-26984",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26984"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnouveau: fix instmem race condition around ptr stores\n\nRunning a lot of VK CTS in parallel against nouveau, once every\nfew hours you might see something like this crash.\n\nBUG: kernel NULL pointer dereference, address: 0000000000000008\nPGD 8000000114e6e067 P4D 8000000114e6e067 PUD 109046067 PMD 0\nOops: 0000 [#1] PREEMPT SMP PTI\nCPU: 7 PID: 53891 Comm: deqp-vk Not tainted 6.8.0-rc6+ #27\nHardware name: Gigabyte Technology Co., Ltd. Z390 I AORUS PRO WIFI/Z390 I AORUS PRO WIFI-CF, BIOS F8 11/05/2021\nRIP: 0010:gp100_vmm_pgt_mem+0xe3/0x180 [nouveau]\nCode: c7 48 01 c8 49 89 45 58 85 d2 0f 84 95 00 00 00 41 0f b7 46 12 49 8b 7e 08 89 da 42 8d 2c f8 48 8b 47 08 41 83 c7 01 48 89 ee \u003c48\u003e 8b 40 08 ff d0 0f 1f 00 49 8b 7e 08 48 89 d9 48 8d 75 04 48 c1\nRSP: 0000:ffffac20c5857838 EFLAGS: 00010202\nRAX: 0000000000000000 RBX: 00000000004d8001 RCX: 0000000000000001\nRDX: 00000000004d8001 RSI: 00000000000006d8 RDI: ffffa07afe332180\nRBP: 00000000000006d8 R08: ffffac20c5857ad0 R09: 0000000000ffff10\nR10: 0000000000000001 R11: ffffa07af27e2de0 R12: 000000000000001c\nR13: ffffac20c5857ad0 R14: ffffa07a96fe9040 R15: 000000000000001c\nFS:  00007fe395eed7c0(0000) GS:ffffa07e2c980000(0000) knlGS:0000000000000000\nCS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 0000000000000008 CR3: 000000011febe001 CR4: 00000000003706f0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\nCall Trace:\n\n...\n\n ? gp100_vmm_pgt_mem+0xe3/0x180 [nouveau]\n ? gp100_vmm_pgt_mem+0x37/0x180 [nouveau]\n nvkm_vmm_iter+0x351/0xa20 [nouveau]\n ? __pfx_nvkm_vmm_ref_ptes+0x10/0x10 [nouveau]\n ? __pfx_gp100_vmm_pgt_mem+0x10/0x10 [nouveau]\n ? __pfx_gp100_vmm_pgt_mem+0x10/0x10 [nouveau]\n ? __lock_acquire+0x3ed/0x2170\n ? __pfx_gp100_vmm_pgt_mem+0x10/0x10 [nouveau]\n nvkm_vmm_ptes_get_map+0xc2/0x100 [nouveau]\n ? __pfx_nvkm_vmm_ref_ptes+0x10/0x10 [nouveau]\n ? __pfx_gp100_vmm_pgt_mem+0x10/0x10 [nouveau]\n nvkm_vmm_map_locked+0x224/0x3a0 [nouveau]\n\nAdding any sort of useful debug usually makes it go away, so I hand\nwrote the function in a line, and debugged the asm.\n\nEvery so often pt-\u003ememory-\u003eptrs is NULL. This ptrs ptr is set in\nthe nv50_instobj_acquire called from nvkm_kmap.\n\nIf Thread A and Thread B both get to nv50_instobj_acquire around\nthe same time, and Thread A hits the refcount_set line, and in\nlockstep thread B succeeds at refcount_inc_not_zero, there is a\nchance the ptrs value won\u0027t have been stored since refcount_set\nis unordered. Force a memory barrier here, I picked smp_mb, since\nwe want it on all CPUs and it\u0027s write followed by a read.\n\nv2: use paired smp_rmb/smp_wmb.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26984",
          "url": "https://www.suse.com/security/cve/CVE-2024-26984"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223633 for CVE-2024-26984",
          "url": "https://bugzilla.suse.com/1223633"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-11T07:41:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26984"
    },
    {
      "cve": "CVE-2024-26996",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26996"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: gadget: f_ncm: Fix UAF ncm object at re-bind after usb ep transport error\n\nWhen ncm function is working and then stop usb0 interface for link down,\neth_stop() is called. At this piont, accidentally if usb transport error\nshould happen in usb_ep_enable(), \u0027in_ep\u0027 and/or \u0027out_ep\u0027 may not be enabled.\n\nAfter that, ncm_disable() is called to disable for ncm unbind\nbut gether_disconnect() is never called since \u0027in_ep\u0027 is not enabled.\n\nAs the result, ncm object is released in ncm unbind\nbut \u0027dev-\u003eport_usb\u0027 associated to \u0027ncm-\u003eport\u0027 is not NULL.\n\nAnd when ncm bind again to recover netdev, ncm object is reallocated\nbut usb0 interface is already associated to previous released ncm object.\n\nTherefore, once usb0 interface is up and eth_start_xmit() is called,\nreleased ncm object is dereferrenced and it might cause use-after-free memory.\n\n[function unlink via configfs]\n  usb0: eth_stop dev-\u003eport_usb=ffffff9b179c3200\n  --\u003e error happens in usb_ep_enable().\n  NCM: ncm_disable: ncm=ffffff9b179c3200\n  --\u003e no gether_disconnect() since ncm-\u003eport.in_ep-\u003eenabled is false.\n  NCM: ncm_unbind: ncm unbind ncm=ffffff9b179c3200\n  NCM: ncm_free: ncm free ncm=ffffff9b179c3200   \u003c-- released ncm\n\n[function link via configfs]\n  NCM: ncm_alloc: ncm alloc ncm=ffffff9ac4f8a000\n  NCM: ncm_bind: ncm bind ncm=ffffff9ac4f8a000\n  NCM: ncm_set_alt: ncm=ffffff9ac4f8a000 alt=0\n  usb0: eth_open dev-\u003eport_usb=ffffff9b179c3200  \u003c-- previous released ncm\n  usb0: eth_start dev-\u003eport_usb=ffffff9b179c3200 \u003c--\n  eth_start_xmit()\n  --\u003e dev-\u003ewrap()\n  Unable to handle kernel paging request at virtual address dead00000000014f\n\nThis patch addresses the issue by checking if \u0027ncm-\u003enetdev\u0027 is not NULL at\nncm_disable() to call gether_disconnect() to deassociate \u0027dev-\u003eport_usb\u0027.\nIt\u0027s more reasonable to check \u0027ncm-\u003enetdev\u0027 to call gether_connect/disconnect\nrather than check \u0027ncm-\u003eport.in_ep-\u003eenabled\u0027 since it might not be enabled\nbut the gether connection might be established.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26996",
          "url": "https://www.suse.com/security/cve/CVE-2024-26996"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223752 for CVE-2024-26996",
          "url": "https://bugzilla.suse.com/1223752"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-11T07:41:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26996"
    },
    {
      "cve": "CVE-2024-27059",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-27059"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nUSB: usb-storage: Prevent divide-by-0 error in isd200_ata_command\n\nThe isd200 sub-driver in usb-storage uses the HEADS and SECTORS values\nin the ATA ID information to calculate cylinder and head values when\ncreating a CDB for READ or WRITE commands.  The calculation involves\ndivision and modulus operations, which will cause a crash if either of\nthese values is 0.  While this never happens with a genuine device, it\ncould happen with a flawed or subversive emulation, as reported by the\nsyzbot fuzzer.\n\nProtect against this possibility by refusing to bind to the device if\neither the ATA_ID_HEADS or ATA_ID_SECTORS value in the device\u0027s ID\ninformation is 0.  This requires isd200_Initialization() to return a\nnegative error code when initialization fails; currently it always\nreturns 0 (even when there is an error).",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-27059",
          "url": "https://www.suse.com/security/cve/CVE-2024-27059"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223738 for CVE-2024-27059",
          "url": "https://bugzilla.suse.com/1223738"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-11T07:41:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-27059"
    },
    {
      "cve": "CVE-2024-27062",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-27062"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnouveau: lock the client object tree.\n\nIt appears the client object tree has no locking unless I\u0027ve missed\nsomething else. Fix races around adding/removing client objects,\nmostly vram bar mappings.\n\n 4562.099306] general protection fault, probably for non-canonical address 0x6677ed422bceb80c: 0000 [#1] PREEMPT SMP PTI\n[ 4562.099314] CPU: 2 PID: 23171 Comm: deqp-vk Not tainted 6.8.0-rc6+ #27\n[ 4562.099324] Hardware name: Gigabyte Technology Co., Ltd. Z390 I AORUS PRO WIFI/Z390 I AORUS PRO WIFI-CF, BIOS F8 11/05/2021\n[ 4562.099330] RIP: 0010:nvkm_object_search+0x1d/0x70 [nouveau]\n[ 4562.099503] Code: 90 90 90 90 90 90 90 90 90 90 90 90 90 66 0f 1f 00 0f 1f 44 00 00 48 89 f8 48 85 f6 74 39 48 8b 87 a0 00 00 00 48 85 c0 74 12 \u003c48\u003e 8b 48 f8 48 39 ce 73 15 48 8b 40 10 48 85 c0 75 ee 48 c7 c0 fe\n[ 4562.099506] RSP: 0000:ffffa94cc420bbf8 EFLAGS: 00010206\n[ 4562.099512] RAX: 6677ed422bceb814 RBX: ffff98108791f400 RCX: ffff9810f26b8f58\n[ 4562.099517] RDX: 0000000000000000 RSI: ffff9810f26b9158 RDI: ffff98108791f400\n[ 4562.099519] RBP: ffff9810f26b9158 R08: 0000000000000000 R09: 0000000000000000\n[ 4562.099521] R10: ffffa94cc420bc48 R11: 0000000000000001 R12: ffff9810f02a7cc0\n[ 4562.099526] R13: 0000000000000000 R14: 00000000000000ff R15: 0000000000000007\n[ 4562.099528] FS:  00007f629c5017c0(0000) GS:ffff98142c700000(0000) knlGS:0000000000000000\n[ 4562.099534] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[ 4562.099536] CR2: 00007f629a882000 CR3: 000000017019e004 CR4: 00000000003706f0\n[ 4562.099541] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n[ 4562.099542] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\n[ 4562.099544] Call Trace:\n[ 4562.099555]  \u003cTASK\u003e\n[ 4562.099573]  ? die_addr+0x36/0x90\n[ 4562.099583]  ? exc_general_protection+0x246/0x4a0\n[ 4562.099593]  ? asm_exc_general_protection+0x26/0x30\n[ 4562.099600]  ? nvkm_object_search+0x1d/0x70 [nouveau]\n[ 4562.099730]  nvkm_ioctl+0xa1/0x250 [nouveau]\n[ 4562.099861]  nvif_object_map_handle+0xc8/0x180 [nouveau]\n[ 4562.099986]  nouveau_ttm_io_mem_reserve+0x122/0x270 [nouveau]\n[ 4562.100156]  ? dma_resv_test_signaled+0x26/0xb0\n[ 4562.100163]  ttm_bo_vm_fault_reserved+0x97/0x3c0 [ttm]\n[ 4562.100182]  ? __mutex_unlock_slowpath+0x2a/0x270\n[ 4562.100189]  nouveau_ttm_fault+0x69/0xb0 [nouveau]\n[ 4562.100356]  __do_fault+0x32/0x150\n[ 4562.100362]  do_fault+0x7c/0x560\n[ 4562.100369]  __handle_mm_fault+0x800/0xc10\n[ 4562.100382]  handle_mm_fault+0x17c/0x3e0\n[ 4562.100388]  do_user_addr_fault+0x208/0x860\n[ 4562.100395]  exc_page_fault+0x7f/0x200\n[ 4562.100402]  asm_exc_page_fault+0x26/0x30\n[ 4562.100412] RIP: 0033:0x9b9870\n[ 4562.100419] Code: 85 a8 f7 ff ff 8b 8d 80 f7 ff ff 89 08 e9 18 f2 ff ff 0f 1f 84 00 00 00 00 00 44 89 32 e9 90 fa ff ff 0f 1f 84 00 00 00 00 00 \u003c44\u003e 89 32 e9 f8 f1 ff ff 0f 1f 84 00 00 00 00 00 66 44 89 32 e9 e7\n[ 4562.100422] RSP: 002b:00007fff9ba2dc70 EFLAGS: 00010246\n[ 4562.100426] RAX: 0000000000000004 RBX: 000000000dd65e10 RCX: 000000fff0000000\n[ 4562.100428] RDX: 00007f629a882000 RSI: 00007f629a882000 RDI: 0000000000000066\n[ 4562.100432] RBP: 00007fff9ba2e570 R08: 0000000000000000 R09: 0000000123ddf000\n[ 4562.100434] R10: 0000000000000001 R11: 0000000000000246 R12: 000000007fffffff\n[ 4562.100436] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000\n[ 4562.100446]  \u003c/TASK\u003e\n[ 4562.100448] Modules linked in: nf_conntrack_netbios_ns nf_conntrack_broadcast nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib nft_reject_inet nf_reject_ipv4 nf_reject_ipv6 nft_reject nft_ct nft_chain_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 ip_set nf_tables libcrc32c nfnetlink cmac bnep sunrpc iwlmvm intel_rapl_msr intel_rapl_common snd_sof_pci_intel_cnl x86_pkg_temp_thermal intel_powerclamp snd_sof_intel_hda_common mac80211 coretemp snd_soc_acpi_intel_match kvm_intel snd_soc_acpi snd_soc_hdac_hda snd_sof_pci snd_sof_xtensa_dsp snd_sof_intel_hda_mlink \n---truncated---",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-27062",
          "url": "https://www.suse.com/security/cve/CVE-2024-27062"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223834 for CVE-2024-27062",
          "url": "https://bugzilla.suse.com/1223834"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-11T07:41:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-27062"
    },
    {
      "cve": "CVE-2024-27396",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-27396"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: gtp: Fix Use-After-Free in gtp_dellink\n\nSince call_rcu, which is called in the hlist_for_each_entry_rcu traversal\nof gtp_dellink, is not part of the RCU read critical section, it\nis possible that the RCU grace period will pass during the traversal and\nthe key will be free.\n\nTo prevent this, it should be changed to hlist_for_each_entry_safe.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-27396",
          "url": "https://www.suse.com/security/cve/CVE-2024-27396"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1224096 for CVE-2024-27396",
          "url": "https://bugzilla.suse.com/1224096"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-11T07:41:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-27396"
    },
    {
      "cve": "CVE-2024-27398",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-27398"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: Fix use-after-free bugs caused by sco_sock_timeout\n\nWhen the sco connection is established and then, the sco socket\nis releasing, timeout_work will be scheduled to judge whether\nthe sco disconnection is timeout. The sock will be deallocated\nlater, but it is dereferenced again in sco_sock_timeout. As a\nresult, the use-after-free bugs will happen. The root cause is\nshown below:\n\n    Cleanup Thread               |      Worker Thread\nsco_sock_release                 |\n  sco_sock_close                 |\n    __sco_sock_close             |\n      sco_sock_set_timer         |\n        schedule_delayed_work    |\n  sco_sock_kill                  |    (wait a time)\n    sock_put(sk) //FREE          |  sco_sock_timeout\n                                 |    sock_hold(sk) //USE\n\nThe KASAN report triggered by POC is shown below:\n\n[   95.890016] ==================================================================\n[   95.890496] BUG: KASAN: slab-use-after-free in sco_sock_timeout+0x5e/0x1c0\n[   95.890755] Write of size 4 at addr ffff88800c388080 by task kworker/0:0/7\n...\n[   95.890755] Workqueue: events sco_sock_timeout\n[   95.890755] Call Trace:\n[   95.890755]  \u003cTASK\u003e\n[   95.890755]  dump_stack_lvl+0x45/0x110\n[   95.890755]  print_address_description+0x78/0x390\n[   95.890755]  print_report+0x11b/0x250\n[   95.890755]  ? __virt_addr_valid+0xbe/0xf0\n[   95.890755]  ? sco_sock_timeout+0x5e/0x1c0\n[   95.890755]  kasan_report+0x139/0x170\n[   95.890755]  ? update_load_avg+0xe5/0x9f0\n[   95.890755]  ? sco_sock_timeout+0x5e/0x1c0\n[   95.890755]  kasan_check_range+0x2c3/0x2e0\n[   95.890755]  sco_sock_timeout+0x5e/0x1c0\n[   95.890755]  process_one_work+0x561/0xc50\n[   95.890755]  worker_thread+0xab2/0x13c0\n[   95.890755]  ? pr_cont_work+0x490/0x490\n[   95.890755]  kthread+0x279/0x300\n[   95.890755]  ? pr_cont_work+0x490/0x490\n[   95.890755]  ? kthread_blkcg+0xa0/0xa0\n[   95.890755]  ret_from_fork+0x34/0x60\n[   95.890755]  ? kthread_blkcg+0xa0/0xa0\n[   95.890755]  ret_from_fork_asm+0x11/0x20\n[   95.890755]  \u003c/TASK\u003e\n[   95.890755]\n[   95.890755] Allocated by task 506:\n[   95.890755]  kasan_save_track+0x3f/0x70\n[   95.890755]  __kasan_kmalloc+0x86/0x90\n[   95.890755]  __kmalloc+0x17f/0x360\n[   95.890755]  sk_prot_alloc+0xe1/0x1a0\n[   95.890755]  sk_alloc+0x31/0x4e0\n[   95.890755]  bt_sock_alloc+0x2b/0x2a0\n[   95.890755]  sco_sock_create+0xad/0x320\n[   95.890755]  bt_sock_create+0x145/0x320\n[   95.890755]  __sock_create+0x2e1/0x650\n[   95.890755]  __sys_socket+0xd0/0x280\n[   95.890755]  __x64_sys_socket+0x75/0x80\n[   95.890755]  do_syscall_64+0xc4/0x1b0\n[   95.890755]  entry_SYSCALL_64_after_hwframe+0x67/0x6f\n[   95.890755]\n[   95.890755] Freed by task 506:\n[   95.890755]  kasan_save_track+0x3f/0x70\n[   95.890755]  kasan_save_free_info+0x40/0x50\n[   95.890755]  poison_slab_object+0x118/0x180\n[   95.890755]  __kasan_slab_free+0x12/0x30\n[   95.890755]  kfree+0xb2/0x240\n[   95.890755]  __sk_destruct+0x317/0x410\n[   95.890755]  sco_sock_release+0x232/0x280\n[   95.890755]  sock_close+0xb2/0x210\n[   95.890755]  __fput+0x37f/0x770\n[   95.890755]  task_work_run+0x1ae/0x210\n[   95.890755]  get_signal+0xe17/0xf70\n[   95.890755]  arch_do_signal_or_restart+0x3f/0x520\n[   95.890755]  syscall_exit_to_user_mode+0x55/0x120\n[   95.890755]  do_syscall_64+0xd1/0x1b0\n[   95.890755]  entry_SYSCALL_64_after_hwframe+0x67/0x6f\n[   95.890755]\n[   95.890755] The buggy address belongs to the object at ffff88800c388000\n[   95.890755]  which belongs to the cache kmalloc-1k of size 1024\n[   95.890755] The buggy address is located 128 bytes inside of\n[   95.890755]  freed 1024-byte region [ffff88800c388000, ffff88800c388400)\n[   95.890755]\n[   95.890755] The buggy address belongs to the physical page:\n[   95.890755] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0xffff88800c38a800 pfn:0xc388\n[   95.890755] head: order:3 entire_mapcount:0 nr_pages_mapped:0 pincount:0\n[   95.890755] ano\n---truncated---",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-27398",
          "url": "https://www.suse.com/security/cve/CVE-2024-27398"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1224174 for CVE-2024-27398",
          "url": "https://bugzilla.suse.com/1224174"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1225013 for CVE-2024-27398",
          "url": "https://bugzilla.suse.com/1225013"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-11T07:41:39Z",
          "details": "important"
        }
      ],
      "title": "CVE-2024-27398"
    },
    {
      "cve": "CVE-2024-27401",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-27401"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfirewire: nosy: ensure user_length is taken into account when fetching packet contents\n\nEnsure that packet_buffer_get respects the user_length provided. If\nthe length of the head packet exceeds the user_length, packet_buffer_get\nwill now return 0 to signify to the user that no data were read\nand a larger buffer size is required. Helps prevent user space overflows.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-27401",
          "url": "https://www.suse.com/security/cve/CVE-2024-27401"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1224181 for CVE-2024-27401",
          "url": "https://bugzilla.suse.com/1224181"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.6,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-11T07:41:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-27401"
    },
    {
      "cve": "CVE-2024-27419",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-27419"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetrom: Fix data-races around sysctl_net_busy_read\n\nWe need to protect the reader reading the sysctl value because the\nvalue can be changed concurrently.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-27419",
          "url": "https://www.suse.com/security/cve/CVE-2024-27419"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1224759 for CVE-2024-27419",
          "url": "https://bugzilla.suse.com/1224759"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 2.5,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-11T07:41:39Z",
          "details": "low"
        }
      ],
      "title": "CVE-2024-27419"
    },
    {
      "cve": "CVE-2024-27436",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-27436"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: usb-audio: Stop parsing channels bits when all channels are found.\n\nIf a usb audio device sets more bits than the amount of channels\nit could write outside of the map array.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-27436",
          "url": "https://www.suse.com/security/cve/CVE-2024-27436"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1224803 for CVE-2024-27436",
          "url": "https://bugzilla.suse.com/1224803"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-11T07:41:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-27436"
    },
    {
      "cve": "CVE-2024-35789",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-35789"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: mac80211: check/clear fast rx for non-4addr sta VLAN changes\n\nWhen moving a station out of a VLAN and deleting the VLAN afterwards, the\nfast_rx entry still holds a pointer to the VLAN\u0027s netdev, which can cause\nuse-after-free bugs. Fix this by immediately calling ieee80211_check_fast_rx\nafter the VLAN change.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-35789",
          "url": "https://www.suse.com/security/cve/CVE-2024-35789"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1224749 for CVE-2024-35789",
          "url": "https://bugzilla.suse.com/1224749"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1227320 for CVE-2024-35789",
          "url": "https://bugzilla.suse.com/1227320"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-11T07:41:39Z",
          "details": "important"
        }
      ],
      "title": "CVE-2024-35789"
    },
    {
      "cve": "CVE-2024-35791",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-35791"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nKVM: SVM: Flush pages under kvm-\u003elock to fix UAF in svm_register_enc_region()\n\nDo the cache flush of converted pages in svm_register_enc_region() before\ndropping kvm-\u003elock to fix use-after-free issues where region and/or its\narray of pages could be freed by a different task, e.g. if userspace has\n__unregister_enc_region_locked() already queued up for the region.\n\nNote, the \"obvious\" alternative of using local variables doesn\u0027t fully\nresolve the bug, as region-\u003epages is also dynamically allocated.  I.e. the\nregion structure itself would be fine, but region-\u003epages could be freed.\n\nFlushing multiple pages under kvm-\u003elock is unfortunate, but the entire\nflow is a rare slow path, and the manual flush is only needed on CPUs that\nlack coherency for encrypted memory.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-35791",
          "url": "https://www.suse.com/security/cve/CVE-2024-35791"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1224725 for CVE-2024-35791",
          "url": "https://bugzilla.suse.com/1224725"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-11T07:41:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-35791"
    },
    {
      "cve": "CVE-2024-35809",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-35809"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nPCI/PM: Drain runtime-idle callbacks before driver removal\n\nA race condition between the .runtime_idle() callback and the .remove()\ncallback in the rtsx_pcr PCI driver leads to a kernel crash due to an\nunhandled page fault [1].\n\nThe problem is that rtsx_pci_runtime_idle() is not expected to be running\nafter pm_runtime_get_sync() has been called, but the latter doesn\u0027t really\nguarantee that.  It only guarantees that the suspend and resume callbacks\nwill not be running when it returns.\n\nHowever, if a .runtime_idle() callback is already running when\npm_runtime_get_sync() is called, the latter will notice that the runtime PM\nstatus of the device is RPM_ACTIVE and it will return right away without\nwaiting for the former to complete.  In fact, it cannot wait for\n.runtime_idle() to complete because it may be called from that callback (it\narguably does not make much sense to do that, but it is not strictly\nprohibited).\n\nThus in general, whoever is providing a .runtime_idle() callback needs\nto protect it from running in parallel with whatever code runs after\npm_runtime_get_sync().  [Note that .runtime_idle() will not start after\npm_runtime_get_sync() has returned, but it may continue running then if it\nhas started earlier.]\n\nOne way to address that race condition is to call pm_runtime_barrier()\nafter pm_runtime_get_sync() (not before it, because a nonzero value of the\nruntime PM usage counter is necessary to prevent runtime PM callbacks from\nbeing invoked) to wait for the .runtime_idle() callback to complete should\nit be running at that point.  A suitable place for doing that is in\npci_device_remove() which calls pm_runtime_get_sync() before removing the\ndriver, so it may as well call pm_runtime_barrier() subsequently, which\nwill prevent the race in question from occurring, not just in the rtsx_pcr\ndriver, but in any PCI drivers providing .runtime_idle() callbacks.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-35809",
          "url": "https://www.suse.com/security/cve/CVE-2024-35809"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1224738 for CVE-2024-35809",
          "url": "https://bugzilla.suse.com/1224738"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-11T07:41:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-35809"
    },
    {
      "cve": "CVE-2024-35811",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-35811"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: brcmfmac: Fix use-after-free bug in brcmf_cfg80211_detach\n\nThis is the candidate patch of CVE-2023-47233 :\nhttps://nvd.nist.gov/vuln/detail/CVE-2023-47233\n\nIn brcm80211 driver,it starts with the following invoking chain\nto start init a timeout worker:\n\n-\u003ebrcmf_usb_probe\n  -\u003ebrcmf_usb_probe_cb\n    -\u003ebrcmf_attach\n      -\u003ebrcmf_bus_started\n        -\u003ebrcmf_cfg80211_attach\n          -\u003ewl_init_priv\n            -\u003ebrcmf_init_escan\n              -\u003eINIT_WORK(\u0026cfg-\u003eescan_timeout_work,\n\t\t  brcmf_cfg80211_escan_timeout_worker);\n\nIf we disconnect the USB by hotplug, it will call\nbrcmf_usb_disconnect to make cleanup. The invoking chain is :\n\nbrcmf_usb_disconnect\n  -\u003ebrcmf_usb_disconnect_cb\n    -\u003ebrcmf_detach\n      -\u003ebrcmf_cfg80211_detach\n        -\u003ekfree(cfg);\n\nWhile the timeout woker may still be running. This will cause\na use-after-free bug on cfg in brcmf_cfg80211_escan_timeout_worker.\n\nFix it by deleting the timer and canceling the worker in\nbrcmf_cfg80211_detach.\n\n[arend.vanspriel@broadcom.com: keep timer delete as is and cancel work just before free]",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-35811",
          "url": "https://www.suse.com/security/cve/CVE-2024-35811"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1224592 for CVE-2024-35811",
          "url": "https://bugzilla.suse.com/1224592"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-11T07:41:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-35811"
    },
    {
      "cve": "CVE-2024-35830",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-35830"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: tc358743: register v4l2 async device only after successful setup\n\nEnsure the device has been setup correctly before registering the v4l2\nasync device, thus allowing userspace to access.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-35830",
          "url": "https://www.suse.com/security/cve/CVE-2024-35830"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1224680 for CVE-2024-35830",
          "url": "https://bugzilla.suse.com/1224680"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-11T07:41:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-35830"
    },
    {
      "cve": "CVE-2024-35849",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-35849"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: fix information leak in btrfs_ioctl_logical_to_ino()\n\nSyzbot reported the following information leak for in\nbtrfs_ioctl_logical_to_ino():\n\n  BUG: KMSAN: kernel-infoleak in instrument_copy_to_user include/linux/instrumented.h:114 [inline]\n  BUG: KMSAN: kernel-infoleak in _copy_to_user+0xbc/0x110 lib/usercopy.c:40\n   instrument_copy_to_user include/linux/instrumented.h:114 [inline]\n   _copy_to_user+0xbc/0x110 lib/usercopy.c:40\n   copy_to_user include/linux/uaccess.h:191 [inline]\n   btrfs_ioctl_logical_to_ino+0x440/0x750 fs/btrfs/ioctl.c:3499\n   btrfs_ioctl+0x714/0x1260\n   vfs_ioctl fs/ioctl.c:51 [inline]\n   __do_sys_ioctl fs/ioctl.c:904 [inline]\n   __se_sys_ioctl+0x261/0x450 fs/ioctl.c:890\n   __x64_sys_ioctl+0x96/0xe0 fs/ioctl.c:890\n   x64_sys_call+0x1883/0x3b50 arch/x86/include/generated/asm/syscalls_64.h:17\n   do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n   do_syscall_64+0xcf/0x1e0 arch/x86/entry/common.c:83\n   entry_SYSCALL_64_after_hwframe+0x77/0x7f\n\n  Uninit was created at:\n   __kmalloc_large_node+0x231/0x370 mm/slub.c:3921\n   __do_kmalloc_node mm/slub.c:3954 [inline]\n   __kmalloc_node+0xb07/0x1060 mm/slub.c:3973\n   kmalloc_node include/linux/slab.h:648 [inline]\n   kvmalloc_node+0xc0/0x2d0 mm/util.c:634\n   kvmalloc include/linux/slab.h:766 [inline]\n   init_data_container+0x49/0x1e0 fs/btrfs/backref.c:2779\n   btrfs_ioctl_logical_to_ino+0x17c/0x750 fs/btrfs/ioctl.c:3480\n   btrfs_ioctl+0x714/0x1260\n   vfs_ioctl fs/ioctl.c:51 [inline]\n   __do_sys_ioctl fs/ioctl.c:904 [inline]\n   __se_sys_ioctl+0x261/0x450 fs/ioctl.c:890\n   __x64_sys_ioctl+0x96/0xe0 fs/ioctl.c:890\n   x64_sys_call+0x1883/0x3b50 arch/x86/include/generated/asm/syscalls_64.h:17\n   do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n   do_syscall_64+0xcf/0x1e0 arch/x86/entry/common.c:83\n   entry_SYSCALL_64_after_hwframe+0x77/0x7f\n\n  Bytes 40-65535 of 65536 are uninitialized\n  Memory access of size 65536 starts at ffff888045a40000\n\nThis happens, because we\u0027re copying a \u0027struct btrfs_data_container\u0027 back\nto user-space. This btrfs_data_container is allocated in\n\u0027init_data_container()\u0027 via kvmalloc(), which does not zero-fill the\nmemory.\n\nFix this by using kvzalloc() which zeroes out the memory on allocation.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-35849",
          "url": "https://www.suse.com/security/cve/CVE-2024-35849"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1224733 for CVE-2024-35849",
          "url": "https://bugzilla.suse.com/1224733"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-11T07:41:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-35849"
    },
    {
      "cve": "CVE-2024-35877",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-35877"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nx86/mm/pat: fix VM_PAT handling in COW mappings\n\nPAT handling won\u0027t do the right thing in COW mappings: the first PTE (or,\nin fact, all PTEs) can be replaced during write faults to point at anon\nfolios.  Reliably recovering the correct PFN and cachemode using\nfollow_phys() from PTEs will not work in COW mappings.\n\nUsing follow_phys(), we might just get the address+protection of the anon\nfolio (which is very wrong), or fail on swap/nonswap entries, failing\nfollow_phys() and triggering a WARN_ON_ONCE() in untrack_pfn() and\ntrack_pfn_copy(), not properly calling free_pfn_range().\n\nIn free_pfn_range(), we either wouldn\u0027t call memtype_free() or would call\nit with the wrong range, possibly leaking memory.\n\nTo fix that, let\u0027s update follow_phys() to refuse returning anon folios,\nand fallback to using the stored PFN inside vma-\u003evm_pgoff for COW mappings\nif we run into that.\n\nWe will now properly handle untrack_pfn() with COW mappings, where we\ndon\u0027t need the cachemode.  We\u0027ll have to fail fork()-\u003etrack_pfn_copy() if\nthe first page was replaced by an anon folio, though: we\u0027d have to store\nthe cachemode in the VMA to make this work, likely growing the VMA size.\n\nFor now, lets keep it simple and let track_pfn_copy() just fail in that\ncase: it would have failed in the past with swap/nonswap entries already,\nand it would have done the wrong thing with anon folios.\n\nSimple reproducer to trigger the WARN_ON_ONCE() in untrack_pfn():\n\n\u003c--- C reproducer ---\u003e\n #include \u003cstdio.h\u003e\n #include \u003csys/mman.h\u003e\n #include \u003cunistd.h\u003e\n #include \u003cliburing.h\u003e\n\n int main(void)\n {\n         struct io_uring_params p = {};\n         int ring_fd;\n         size_t size;\n         char *map;\n\n         ring_fd = io_uring_setup(1, \u0026p);\n         if (ring_fd \u003c 0) {\n                 perror(\"io_uring_setup\");\n                 return 1;\n         }\n         size = p.sq_off.array + p.sq_entries * sizeof(unsigned);\n\n         /* Map the submission queue ring MAP_PRIVATE */\n         map = mmap(0, size, PROT_READ | PROT_WRITE, MAP_PRIVATE,\n                    ring_fd, IORING_OFF_SQ_RING);\n         if (map == MAP_FAILED) {\n                 perror(\"mmap\");\n                 return 1;\n         }\n\n         /* We have at least one page. Let\u0027s COW it. */\n         *map = 0;\n         pause();\n         return 0;\n }\n\u003c--- C reproducer ---\u003e\n\nOn a system with 16 GiB RAM and swap configured:\n # ./iouring \u0026\n # memhog 16G\n # killall iouring\n[  301.552930] ------------[ cut here ]------------\n[  301.553285] WARNING: CPU: 7 PID: 1402 at arch/x86/mm/pat/memtype.c:1060 untrack_pfn+0xf4/0x100\n[  301.553989] Modules linked in: binfmt_misc nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib nft_reject_g\n[  301.558232] CPU: 7 PID: 1402 Comm: iouring Not tainted 6.7.5-100.fc38.x86_64 #1\n[  301.558772] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.16.3-0-ga6ed6b701f0a-prebu4\n[  301.559569] RIP: 0010:untrack_pfn+0xf4/0x100\n[  301.559893] Code: 75 c4 eb cf 48 8b 43 10 8b a8 e8 00 00 00 3b 6b 28 74 b8 48 8b 7b 30 e8 ea 1a f7 000\n[  301.561189] RSP: 0018:ffffba2c0377fab8 EFLAGS: 00010282\n[  301.561590] RAX: 00000000ffffffea RBX: ffff9208c8ce9cc0 RCX: 000000010455e047\n[  301.562105] RDX: 07fffffff0eb1e0a RSI: 0000000000000000 RDI: ffff9208c391d200\n[  301.562628] RBP: 0000000000000000 R08: ffffba2c0377fab8 R09: 0000000000000000\n[  301.563145] R10: ffff9208d2292d50 R11: 0000000000000002 R12: 00007fea890e0000\n[  301.563669] R13: 0000000000000000 R14: ffffba2c0377fc08 R15: 0000000000000000\n[  301.564186] FS:  0000000000000000(0000) GS:ffff920c2fbc0000(0000) knlGS:0000000000000000\n[  301.564773] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[  301.565197] CR2: 00007fea88ee8a20 CR3: 00000001033a8000 CR4: 0000000000750ef0\n[  301.565725] PKRU: 55555554\n[  301.565944] Call Trace:\n[  301.566148]  \u003cTASK\u003e\n[  301.566325]  ? untrack_pfn+0xf4/0x100\n[  301.566618]  ? __warn+0x81/0x130\n[  301.566876]  ? untrack_pfn+0xf4/0x100\n[  3\n---truncated---",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-35877",
          "url": "https://www.suse.com/security/cve/CVE-2024-35877"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1224525 for CVE-2024-35877",
          "url": "https://bugzilla.suse.com/1224525"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-11T07:41:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-35877"
    },
    {
      "cve": "CVE-2024-35878",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-35878"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nof: module: prevent NULL pointer dereference in vsnprintf()\n\nIn of_modalias(), we can get passed the str and len parameters which would\ncause a kernel oops in vsnprintf() since it only allows passing a NULL ptr\nwhen the length is also 0. Also, we need to filter out the negative values\nof the len parameter as these will result in a really huge buffer since\nsnprintf() takes size_t parameter while ours is ssize_t...\n\nFound by Linux Verification Center (linuxtesting.org) with the Svace static\nanalysis tool.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-35878",
          "url": "https://www.suse.com/security/cve/CVE-2024-35878"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1224671 for CVE-2024-35878",
          "url": "https://bugzilla.suse.com/1224671"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-11T07:41:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-35878"
    },
    {
      "cve": "CVE-2024-35887",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-35887"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nax25: fix use-after-free bugs caused by ax25_ds_del_timer\n\nWhen the ax25 device is detaching, the ax25_dev_device_down()\ncalls ax25_ds_del_timer() to cleanup the slave_timer. When\nthe timer handler is running, the ax25_ds_del_timer() that\ncalls del_timer() in it will return directly. As a result,\nthe use-after-free bugs could happen, one of the scenarios\nis shown below:\n\n      (Thread 1)          |      (Thread 2)\n                          | ax25_ds_timeout()\nax25_dev_device_down()    |\n  ax25_ds_del_timer()     |\n    del_timer()           |\n  ax25_dev_put() //FREE   |\n                          |  ax25_dev-\u003e //USE\n\nIn order to mitigate bugs, when the device is detaching, use\ntimer_shutdown_sync() to stop the timer.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-35887",
          "url": "https://www.suse.com/security/cve/CVE-2024-35887"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1224663 for CVE-2024-35887",
          "url": "https://bugzilla.suse.com/1224663"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-11T07:41:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-35887"
    },
    {
      "cve": "CVE-2024-35895",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-35895"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf, sockmap: Prevent lock inversion deadlock in map delete elem\n\nsyzkaller started using corpuses where a BPF tracing program deletes\nelements from a sockmap/sockhash map. Because BPF tracing programs can be\ninvoked from any interrupt context, locks taken during a map_delete_elem\noperation must be hardirq-safe. Otherwise a deadlock due to lock inversion\nis possible, as reported by lockdep:\n\n       CPU0                    CPU1\n       ----                    ----\n  lock(\u0026htab-\u003ebuckets[i].lock);\n                               local_irq_disable();\n                               lock(\u0026host-\u003elock);\n                               lock(\u0026htab-\u003ebuckets[i].lock);\n  \u003cInterrupt\u003e\n    lock(\u0026host-\u003elock);\n\nLocks in sockmap are hardirq-unsafe by design. We expects elements to be\ndeleted from sockmap/sockhash only in task (normal) context with interrupts\nenabled, or in softirq context.\n\nDetect when map_delete_elem operation is invoked from a context which is\n_not_ hardirq-unsafe, that is interrupts are disabled, and bail out with an\nerror.\n\nNote that map updates are not affected by this issue. BPF verifier does not\nallow updating sockmap/sockhash from a BPF tracing program today.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-35895",
          "url": "https://www.suse.com/security/cve/CVE-2024-35895"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1224511 for CVE-2024-35895",
          "url": "https://bugzilla.suse.com/1224511"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-11T07:41:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-35895"
    },
    {
      "cve": "CVE-2024-35914",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-35914"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnfsd: Fix error cleanup path in nfsd_rename()\n\nCommit a8b0026847b8 (\"rename(): avoid a deadlock in the case of parents\nhaving no common ancestor\") added an error bail out path. However this\npath does not drop the remount protection that has been acquired. Fix\nthe cleanup path to properly drop the remount protection.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-35914",
          "url": "https://www.suse.com/security/cve/CVE-2024-35914"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1224482 for CVE-2024-35914",
          "url": "https://bugzilla.suse.com/1224482"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-11T07:41:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-35914"
    },
    {
      "cve": "CVE-2024-35932",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-35932"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/vc4: don\u0027t check if plane-\u003estate-\u003efb == state-\u003efb\n\nCurrently, when using non-blocking commits, we can see the following\nkernel warning:\n\n[  110.908514] ------------[ cut here ]------------\n[  110.908529] refcount_t: underflow; use-after-free.\n[  110.908620] WARNING: CPU: 0 PID: 1866 at lib/refcount.c:87 refcount_dec_not_one+0xb8/0xc0\n[  110.908664] Modules linked in: rfcomm snd_seq_dummy snd_hrtimer snd_seq snd_seq_device cmac algif_hash aes_arm64 aes_generic algif_skcipher af_alg bnep hid_logitech_hidpp vc4 brcmfmac hci_uart btbcm brcmutil bluetooth snd_soc_hdmi_codec cfg80211 cec drm_display_helper drm_dma_helper drm_kms_helper snd_soc_core snd_compress snd_pcm_dmaengine fb_sys_fops sysimgblt syscopyarea sysfillrect raspberrypi_hwmon ecdh_generic ecc rfkill libaes i2c_bcm2835 binfmt_misc joydev snd_bcm2835(C) bcm2835_codec(C) bcm2835_isp(C) v4l2_mem2mem videobuf2_dma_contig snd_pcm bcm2835_v4l2(C) raspberrypi_gpiomem bcm2835_mmal_vchiq(C) videobuf2_v4l2 snd_timer videobuf2_vmalloc videobuf2_memops videobuf2_common snd videodev vc_sm_cma(C) mc hid_logitech_dj uio_pdrv_genirq uio i2c_dev drm fuse dm_mod drm_panel_orientation_quirks backlight ip_tables x_tables ipv6\n[  110.909086] CPU: 0 PID: 1866 Comm: kodi.bin Tainted: G         C         6.1.66-v8+ #32\n[  110.909104] Hardware name: Raspberry Pi 3 Model B Rev 1.2 (DT)\n[  110.909114] pstate: 60000005 (nZCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)\n[  110.909132] pc : refcount_dec_not_one+0xb8/0xc0\n[  110.909152] lr : refcount_dec_not_one+0xb4/0xc0\n[  110.909170] sp : ffffffc00913b9c0\n[  110.909177] x29: ffffffc00913b9c0 x28: 000000556969bbb0 x27: 000000556990df60\n[  110.909205] x26: 0000000000000002 x25: 0000000000000004 x24: ffffff8004448480\n[  110.909230] x23: ffffff800570b500 x22: ffffff802e03a7bc x21: ffffffecfca68c78\n[  110.909257] x20: ffffff8002b42000 x19: ffffff802e03a600 x18: 0000000000000000\n[  110.909283] x17: 0000000000000011 x16: ffffffffffffffff x15: 0000000000000004\n[  110.909308] x14: 0000000000000fff x13: ffffffed577e47e0 x12: 0000000000000003\n[  110.909333] x11: 0000000000000000 x10: 0000000000000027 x9 : c912d0d083728c00\n[  110.909359] x8 : c912d0d083728c00 x7 : 65646e75203a745f x6 : 746e756f63666572\n[  110.909384] x5 : ffffffed579f62ee x4 : ffffffed579eb01e x3 : 0000000000000000\n[  110.909409] x2 : 0000000000000000 x1 : ffffffc00913b750 x0 : 0000000000000001\n[  110.909434] Call trace:\n[  110.909441]  refcount_dec_not_one+0xb8/0xc0\n[  110.909461]  vc4_bo_dec_usecnt+0x4c/0x1b0 [vc4]\n[  110.909903]  vc4_cleanup_fb+0x44/0x50 [vc4]\n[  110.910315]  drm_atomic_helper_cleanup_planes+0x88/0xa4 [drm_kms_helper]\n[  110.910669]  vc4_atomic_commit_tail+0x390/0x9dc [vc4]\n[  110.911079]  commit_tail+0xb0/0x164 [drm_kms_helper]\n[  110.911397]  drm_atomic_helper_commit+0x1d0/0x1f0 [drm_kms_helper]\n[  110.911716]  drm_atomic_commit+0xb0/0xdc [drm]\n[  110.912569]  drm_mode_atomic_ioctl+0x348/0x4b8 [drm]\n[  110.913330]  drm_ioctl_kernel+0xec/0x15c [drm]\n[  110.914091]  drm_ioctl+0x24c/0x3b0 [drm]\n[  110.914850]  __arm64_sys_ioctl+0x9c/0xd4\n[  110.914873]  invoke_syscall+0x4c/0x114\n[  110.914897]  el0_svc_common+0xd0/0x118\n[  110.914917]  do_el0_svc+0x38/0xd0\n[  110.914936]  el0_svc+0x30/0x8c\n[  110.914958]  el0t_64_sync_handler+0x84/0xf0\n[  110.914979]  el0t_64_sync+0x18c/0x190\n[  110.914996] ---[ end trace 0000000000000000 ]---\n\nThis happens because, although `prepare_fb` and `cleanup_fb` are\nperfectly balanced, we cannot guarantee consistency in the check\nplane-\u003estate-\u003efb == state-\u003efb. This means that sometimes we can increase\nthe refcount in `prepare_fb` and don\u0027t decrease it in `cleanup_fb`. The\nopposite can also be true.\n\nIn fact, the struct drm_plane .state shouldn\u0027t be accessed directly\nbut instead, the `drm_atomic_get_new_plane_state()` helper function should\nbe used. So, we could stick to this check, but using\n`drm_atomic_get_new_plane_state()`. But actually, this check is not re\n---truncated---",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-35932",
          "url": "https://www.suse.com/security/cve/CVE-2024-35932"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1224650 for CVE-2024-35932",
          "url": "https://bugzilla.suse.com/1224650"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-11T07:41:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-35932"
    },
    {
      "cve": "CVE-2024-35935",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-35935"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: send: handle path ref underflow in header iterate_inode_ref()\n\nChange BUG_ON to proper error handling if building the path buffer\nfails. The pointers are not printed so we don\u0027t accidentally leak kernel\naddresses.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-35935",
          "url": "https://www.suse.com/security/cve/CVE-2024-35935"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1224645 for CVE-2024-35935",
          "url": "https://bugzilla.suse.com/1224645"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-11T07:41:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-35935"
    },
    {
      "cve": "CVE-2024-35936",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-35936"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: handle chunk tree lookup error in btrfs_relocate_sys_chunks()\n\nThe unhandled case in btrfs_relocate_sys_chunks() loop is a corruption,\nas it could be caused only by two impossible conditions:\n\n- at first the search key is set up to look for a chunk tree item, with\n  offset -1, this is an inexact search and the key-\u003eoffset will contain\n  the correct offset upon a successful search, a valid chunk tree item\n  cannot have an offset -1\n\n- after first successful search, the found_key corresponds to a chunk\n  item, the offset is decremented by 1 before the next loop, it\u0027s\n  impossible to find a chunk item there due to alignment and size\n  constraints",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-35936",
          "url": "https://www.suse.com/security/cve/CVE-2024-35936"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1224644 for CVE-2024-35936",
          "url": "https://bugzilla.suse.com/1224644"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-11T07:41:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-35936"
    },
    {
      "cve": "CVE-2024-35944",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-35944"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nVMCI: Fix memcpy() run-time warning in dg_dispatch_as_host()\n\nSyzkaller hit \u0027WARNING in dg_dispatch_as_host\u0027 bug.\n\nmemcpy: detected field-spanning write (size 56) of single field \"\u0026dg_info-\u003emsg\"\nat drivers/misc/vmw_vmci/vmci_datagram.c:237 (size 24)\n\nWARNING: CPU: 0 PID: 1555 at drivers/misc/vmw_vmci/vmci_datagram.c:237\ndg_dispatch_as_host+0x88e/0xa60 drivers/misc/vmw_vmci/vmci_datagram.c:237\n\nSome code commentry, based on my understanding:\n\n544 #define VMCI_DG_SIZE(_dg) (VMCI_DG_HEADERSIZE + (size_t)(_dg)-\u003epayload_size)\n/// This is 24 + payload_size\n\nmemcpy(\u0026dg_info-\u003emsg, dg, dg_size);\n\tDestination = dg_info-\u003emsg ---\u003e this is a 24 byte\n\t\t\t\t\tstructure(struct vmci_datagram)\n\tSource = dg --\u003e this is a 24 byte structure (struct vmci_datagram)\n\tSize = dg_size = 24 + payload_size\n\n{payload_size = 56-24 =32} -- Syzkaller managed to set payload_size to 32.\n\n 35 struct delayed_datagram_info {\n 36         struct datagram_entry *entry;\n 37         struct work_struct work;\n 38         bool in_dg_host_queue;\n 39         /* msg and msg_payload must be together. */\n 40         struct vmci_datagram msg;\n 41         u8 msg_payload[];\n 42 };\n\nSo those extra bytes of payload are copied into msg_payload[], a run time\nwarning is seen while fuzzing with Syzkaller.\n\nOne possible way to fix the warning is to split the memcpy() into\ntwo parts -- one -- direct assignment of msg and second taking care of payload.\n\nGustavo quoted:\n\"Under FORTIFY_SOURCE we should not copy data across multiple members\nin a structure.\"",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-35944",
          "url": "https://www.suse.com/security/cve/CVE-2024-35944"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1224648 for CVE-2024-35944",
          "url": "https://bugzilla.suse.com/1224648"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-11T07:41:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-35944"
    },
    {
      "cve": "CVE-2024-35955",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-35955"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nkprobes: Fix possible use-after-free issue on kprobe registration\n\nWhen unloading a module, its state is changing MODULE_STATE_LIVE -\u003e\n MODULE_STATE_GOING -\u003e MODULE_STATE_UNFORMED. Each change will take\na time. `is_module_text_address()` and `__module_text_address()`\nworks with MODULE_STATE_LIVE and MODULE_STATE_GOING.\nIf we use `is_module_text_address()` and `__module_text_address()`\nseparately, there is a chance that the first one is succeeded but the\nnext one is failed because module-\u003estate becomes MODULE_STATE_UNFORMED\nbetween those operations.\n\nIn `check_kprobe_address_safe()`, if the second `__module_text_address()`\nis failed, that is ignored because it expected a kernel_text address.\nBut it may have failed simply because module-\u003estate has been changed\nto MODULE_STATE_UNFORMED. In this case, arm_kprobe() will try to modify\nnon-exist module text address (use-after-free).\n\nTo fix this problem, we should not use separated `is_module_text_address()`\nand `__module_text_address()`, but use only `__module_text_address()`\nonce and do `try_module_get(module)` which is only available with\nMODULE_STATE_LIVE.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-35955",
          "url": "https://www.suse.com/security/cve/CVE-2024-35955"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1224676 for CVE-2024-35955",
          "url": "https://bugzilla.suse.com/1224676"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-11T07:41:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-35955"
    },
    {
      "cve": "CVE-2024-35969",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-35969"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipv6: fix race condition between ipv6_get_ifaddr and ipv6_del_addr\n\nAlthough ipv6_get_ifaddr walks inet6_addr_lst under the RCU lock, it\nstill means hlist_for_each_entry_rcu can return an item that got removed\nfrom the list. The memory itself of such item is not freed thanks to RCU\nbut nothing guarantees the actual content of the memory is sane.\n\nIn particular, the reference count can be zero. This can happen if\nipv6_del_addr is called in parallel. ipv6_del_addr removes the entry\nfrom inet6_addr_lst (hlist_del_init_rcu(\u0026ifp-\u003eaddr_lst)) and drops all\nreferences (__in6_ifa_put(ifp) + in6_ifa_put(ifp)). With bad enough\ntiming, this can happen:\n\n1. In ipv6_get_ifaddr, hlist_for_each_entry_rcu returns an entry.\n\n2. Then, the whole ipv6_del_addr is executed for the given entry. The\n   reference count drops to zero and kfree_rcu is scheduled.\n\n3. ipv6_get_ifaddr continues and tries to increments the reference count\n   (in6_ifa_hold).\n\n4. The rcu is unlocked and the entry is freed.\n\n5. The freed entry is returned.\n\nPrevent increasing of the reference count in such case. The name\nin6_ifa_hold_safe is chosen to mimic the existing fib6_info_hold_safe.\n\n[   41.506330] refcount_t: addition on 0; use-after-free.\n[   41.506760] WARNING: CPU: 0 PID: 595 at lib/refcount.c:25 refcount_warn_saturate+0xa5/0x130\n[   41.507413] Modules linked in: veth bridge stp llc\n[   41.507821] CPU: 0 PID: 595 Comm: python3 Not tainted 6.9.0-rc2.main-00208-g49563be82afa #14\n[   41.508479] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996)\n[   41.509163] RIP: 0010:refcount_warn_saturate+0xa5/0x130\n[   41.509586] Code: ad ff 90 0f 0b 90 90 c3 cc cc cc cc 80 3d c0 30 ad 01 00 75 a0 c6 05 b7 30 ad 01 01 90 48 c7 c7 38 cc 7a 8c e8 cc 18 ad ff 90 \u003c0f\u003e 0b 90 90 c3 cc cc cc cc 80 3d 98 30 ad 01 00 0f 85 75 ff ff ff\n[   41.510956] RSP: 0018:ffffbda3c026baf0 EFLAGS: 00010282\n[   41.511368] RAX: 0000000000000000 RBX: ffff9e9c46914800 RCX: 0000000000000000\n[   41.511910] RDX: ffff9e9c7ec29c00 RSI: ffff9e9c7ec1c900 RDI: ffff9e9c7ec1c900\n[   41.512445] RBP: ffff9e9c43660c9c R08: 0000000000009ffb R09: 00000000ffffdfff\n[   41.512998] R10: 00000000ffffdfff R11: ffffffff8ca58a40 R12: ffff9e9c4339a000\n[   41.513534] R13: 0000000000000001 R14: ffff9e9c438a0000 R15: ffffbda3c026bb48\n[   41.514086] FS:  00007fbc4cda1740(0000) GS:ffff9e9c7ec00000(0000) knlGS:0000000000000000\n[   41.514726] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[   41.515176] CR2: 000056233b337d88 CR3: 000000000376e006 CR4: 0000000000370ef0\n[   41.515713] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n[   41.516252] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\n[   41.516799] Call Trace:\n[   41.517037]  \u003cTASK\u003e\n[   41.517249]  ? __warn+0x7b/0x120\n[   41.517535]  ? refcount_warn_saturate+0xa5/0x130\n[   41.517923]  ? report_bug+0x164/0x190\n[   41.518240]  ? handle_bug+0x3d/0x70\n[   41.518541]  ? exc_invalid_op+0x17/0x70\n[   41.520972]  ? asm_exc_invalid_op+0x1a/0x20\n[   41.521325]  ? refcount_warn_saturate+0xa5/0x130\n[   41.521708]  ipv6_get_ifaddr+0xda/0xe0\n[   41.522035]  inet6_rtm_getaddr+0x342/0x3f0\n[   41.522376]  ? __pfx_inet6_rtm_getaddr+0x10/0x10\n[   41.522758]  rtnetlink_rcv_msg+0x334/0x3d0\n[   41.523102]  ? netlink_unicast+0x30f/0x390\n[   41.523445]  ? __pfx_rtnetlink_rcv_msg+0x10/0x10\n[   41.523832]  netlink_rcv_skb+0x53/0x100\n[   41.524157]  netlink_unicast+0x23b/0x390\n[   41.524484]  netlink_sendmsg+0x1f2/0x440\n[   41.524826]  __sys_sendto+0x1d8/0x1f0\n[   41.525145]  __x64_sys_sendto+0x1f/0x30\n[   41.525467]  do_syscall_64+0xa5/0x1b0\n[   41.525794]  entry_SYSCALL_64_after_hwframe+0x72/0x7a\n[   41.526213] RIP: 0033:0x7fbc4cfcea9a\n[   41.526528] Code: d8 64 89 02 48 c7 c0 ff ff ff ff eb b8 0f 1f 00 f3 0f 1e fa 41 89 ca 64 8b 04 25 18 00 00 00 85 c0 75 15 b8 2c 00 00 00 0f 05 \u003c48\u003e 3d 00 f0 ff ff 77 7e c3 0f 1f 44 00 00 41 54 48 83 ec 30 44 89\n[   41.527942] RSP: 002b:00007f\n---truncated---",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-35969",
          "url": "https://www.suse.com/security/cve/CVE-2024-35969"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1224580 for CVE-2024-35969",
          "url": "https://bugzilla.suse.com/1224580"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-11T07:41:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-35969"
    },
    {
      "cve": "CVE-2024-35982",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-35982"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbatman-adv: Avoid infinite loop trying to resize local TT\n\nIf the MTU of one of an attached interface becomes too small to transmit\nthe local translation table then it must be resized to fit inside all\nfragments (when enabled) or a single packet.\n\nBut if the MTU becomes too low to transmit even the header + the VLAN\nspecific part then the resizing of the local TT will never succeed. This\ncan for example happen when the usable space is 110 bytes and 11 VLANs are\non top of batman-adv. In this case, at least 116 byte would be needed.\nThere will just be an endless spam of\n\n   batman_adv: batadv0: Forced to purge local tt entries to fit new maximum fragment MTU (110)\n\nin the log but the function will never finish. Problem here is that the\ntimeout will be halved all the time and will then stagnate at 0 and\ntherefore never be able to reduce the table even more.\n\nThere are other scenarios possible with a similar result. The number of\nBATADV_TT_CLIENT_NOPURGE entries in the local TT can for example be too\nhigh to fit inside a packet. Such a scenario can therefore happen also with\nonly a single VLAN + 7 non-purgable addresses - requiring at least 120\nbytes.\n\nWhile this should be handled proactively when:\n\n* interface with too low MTU is added\n* VLAN is added\n* non-purgeable local mac is added\n* MTU of an attached interface is reduced\n* fragmentation setting gets disabled (which most likely requires dropping\n  attached interfaces)\n\nnot all of these scenarios can be prevented because batman-adv is only\nconsuming events without the the possibility to prevent these actions\n(non-purgable MAC address added, MTU of an attached interface is reduced).\nIt is therefore necessary to also make sure that the code is able to handle\nalso the situations when there were already incompatible system\nconfiguration are present.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-35982",
          "url": "https://www.suse.com/security/cve/CVE-2024-35982"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1224566 for CVE-2024-35982",
          "url": "https://bugzilla.suse.com/1224566"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-11T07:41:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-35982"
    },
    {
      "cve": "CVE-2024-35984",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-35984"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ni2c: smbus: fix NULL function pointer dereference\n\nBaruch reported an OOPS when using the designware controller as target\nonly. Target-only modes break the assumption of one transfer function\nalways being available. Fix this by always checking the pointer in\n__i2c_transfer.\n\n[wsa: dropped the simplification in core-smbus to avoid theoretical regressions]",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-35984",
          "url": "https://www.suse.com/security/cve/CVE-2024-35984"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1224567 for CVE-2024-35984",
          "url": "https://bugzilla.suse.com/1224567"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-11T07:41:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-35984"
    },
    {
      "cve": "CVE-2024-36015",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-36015"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nppdev: Add an error check in register_device\n\nIn register_device, the return value of ida_simple_get is unchecked,\nin witch ida_simple_get will use an invalid index value.\n\nTo address this issue, index should be checked after ida_simple_get. When\nthe index value is abnormal, a warning message should be printed, the port\nshould be dropped, and the value should be recorded.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-36015",
          "url": "https://www.suse.com/security/cve/CVE-2024-36015"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1225640 for CVE-2024-36015",
          "url": "https://bugzilla.suse.com/1225640"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-11T07:41:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-36015"
    },
    {
      "cve": "CVE-2024-36029",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-36029"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmmc: sdhci-msm: pervent access to suspended controller\n\nGeneric sdhci code registers LED device and uses host-\u003eruntime_suspended\nflag to protect access to it. The sdhci-msm driver doesn\u0027t set this flag,\nwhich causes a crash when LED is accessed while controller is runtime\nsuspended. Fix this by setting the flag correctly.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-36029",
          "url": "https://www.suse.com/security/cve/CVE-2024-36029"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1225708 for CVE-2024-36029",
          "url": "https://bugzilla.suse.com/1225708"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-11T07:41:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-36029"
    },
    {
      "cve": "CVE-2024-36954",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-36954"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntipc: fix a possible memleak in tipc_buf_append\n\n__skb_linearize() doesn\u0027t free the skb when it fails, so move\n\u0027*buf = NULL\u0027 after __skb_linearize(), so that the skb can be\nfreed on the err path.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-36954",
          "url": "https://www.suse.com/security/cve/CVE-2024-36954"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1225764 for CVE-2024-36954",
          "url": "https://bugzilla.suse.com/1225764"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-11T07:41:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-36954"
    }
  ]
}
  suse-su-2024:1659-1
Vulnerability from csaf_suse
Published
2024-05-15 09:29
    Modified
2024-05-15 09:29
    Summary
Security update for the Linux Kernel
    Notes
Title of the patch
Security update for the Linux Kernel
    Description of the patch
The SUSE Linux Enterprise 15 SP5 kernel was updated to receive various security bugfixes.
The following security bugs were fixed:
- CVE-2024-26760: Fixed scsi/target/pscsi bio_put() for error case (bsc#1222596).
- CVE-2024-27389: Fixed pstore inode handling with d_invalidate() (bsc#1223705).
- CVE-2024-27062: Fixed nouveau lock inside client object tree (bsc#1223834).
- CVE-2024-27056: Fixed wifi/iwlwifi/mvm to ensure offloading TID queue exists (bsc#1223822).
- CVE-2024-27046: Fixed nfp/flower handling acti_netdevs allocation failure (bsc#1223827).
- CVE-2024-27043: Fixed a use-after-free in edia/dvbdev in different places (bsc#1223824).
- CVE-2024-27041: Fixed drm/amd/display NULL checks for adev->dm.dc in amdgpu_dm_fini() (bsc#1223714).
- CVE-2024-27039: Fixed clk/hisilicon/hi3559a an erroneous devm_kfree() (bsc#1223821).
- CVE-2024-27038: Fixed clk_core_get NULL pointer dereference (bsc#1223816).
- CVE-2024-27030: Fixed octeontx2-af to use separate handlers for interrupts (bsc#1223790).
- CVE-2024-27014: Fixed net/mlx5e to prevent deadlock while disabling aRFS (bsc#1223735).
- CVE-2024-27013: Fixed tun limit printing rate when illegal packet received by tun device (bsc#1223745).
- CVE-2024-26993: Fixed fs/sysfs reference leak in sysfs_break_active_protection() (bsc#1223693).
- CVE-2024-26982: Fixed Squashfs inode number check not to be an invalid value of zero (bsc#1223634).
- CVE-2024-26970: Fixed clk/qcom/gcc-ipq6018 termination of frequency table arrays (bsc#1223644).
- CVE-2024-26969: Fixed clk/qcom/gcc-ipq8074 termination of frequency table arrays (bsc#1223645).
- CVE-2024-26966: Fixed clk/qcom/mmcc-apq8084 termination of frequency table arrays (bsc#1223646).
- CVE-2024-26965: Fixed clk/qcom/mmcc-msm8974 termination of frequency table arrays (bsc#1223648).
- CVE-2024-26960: Fixed mm/swap race between free_swap_and_cache() and swapoff() (bsc#1223655).
- CVE-2024-26951: Fixed wireguard/netlink check for dangling peer via is_dead instead of empty list (bsc#1223660).
- CVE-2024-26950: Fixed wireguard/netlink to access device through ctx instead of peer (bsc#1223661).
- CVE-2024-26948: Fixed drm/amd/display by adding dc_state NULL check in dc_state_release (bsc#1223664).
- CVE-2024-26927: Fixed ASoC/SOF bounds checking to firmware data Smatch (bsc#1223525).
- CVE-2024-26901: Fixed do_sys_name_to_handle() to use kzalloc() to prevent kernel-infoleak (bsc#1223198).
- CVE-2024-26896: Fixed wifi/wfx memory leak when starting AP (bsc#1223042).
- CVE-2024-26893: Fixed firmware/arm_scmi for possible double free in SMC transport cleanup path (bsc#1223196).
- CVE-2024-26885: Fixed bpf DEVMAP_HASH overflow check on 32-bit arches (bsc#1223190).
- CVE-2024-26884: Fixed bpf hashtab overflow check on 32-bit arches (bsc#1223189).
- CVE-2024-26883: Fixed bpf stackmap overflow check on 32-bit arches (bsc#1223035).
- CVE-2024-26882: Fixed net/ip_tunnel to make sure to pull inner header in ip_tunnel_rcv() (bsc#1223034).
- CVE-2024-26881: Fixed net/hns3 kernel crash when 1588 is received on HIP08 devices (bsc#1223041).
- CVE-2024-26879: Fixed clk/meson by adding missing clocks to axg_clk_regmaps (bsc#1223066).
- CVE-2024-26878: Fixed quota for potential NULL pointer dereference (bsc#1223060).
- CVE-2024-26866: Fixed spi/spi-fsl-lpspi by removing redundant spi_controller_put call (bsc#1223024).
- CVE-2024-26862: Fixed packet annotate data-races around ignore_outgoing (bsc#1223111).
- CVE-2024-26861: Fixed wireguard/receive annotate data-race around receiving_counter.counter (bsc#1223076).
- CVE-2024-26857: Fixed geneve to make sure to pull inner header in geneve_rx() (bsc#1223058).
- CVE-2024-26856: Fixed use-after-free inside sparx5_del_mact_entry (bsc#1223052).
- CVE-2024-26855: Fixed net/ice potential NULL pointer dereference in ice_bridge_setlink() (bsc#1223051).
- CVE-2024-26853: Fixed igc returning frame twice in XDP_REDIRECT (bsc#1223061).
- CVE-2024-26852: Fixed net/ipv6 to avoid possible UAF in ip6_route_mpath_notify() (bsc#1223057).
- CVE-2024-26848: Fixed afs endless loop in directory parsing (bsc#1223030).
- CVE-2024-26836: Fixed platform/x86/think-lmi password opcode ordering for workstations (bsc#1222968).
- CVE-2024-26830: Fixed i40e to not allow untrusted VF to remove administratively set MAC (bsc#1223012).
- CVE-2024-26817: Fixed amdkfd to use calloc instead of kzalloc to avoid integer overflow (bsc#1222812).
- CVE-2024-26816: Fixed relocations in .notes section when building with CONFIG_XEN_PV=y by ignoring them (bsc#1222624).
- CVE-2024-26807: Fixed spi/cadence-qspi NULL pointer reference in runtime PM hooks (bsc#1222801).
- CVE-2024-26805: Fixed a kernel-infoleak-after-free in __skb_datagram_iter in netlink  (bsc#1222630).
- CVE-2024-26793: Fixed an use-after-free and null-ptr-deref in gtp_newlink() in gtp  (bsc#1222428).
- CVE-2024-26783: Fixed mm/vmscan bug when calling wakeup_kswapd() with a wrong zone index (bsc#1222615).
- CVE-2024-26773: Fixed ext4 block allocation from corrupted group in ext4_mb_try_best_found() (bsc#1222618).
- CVE-2024-26772: Fixed ext4 to avoid allocating blocks from corrupted group in ext4_mb_find_by_goal() (bsc#1222613).
- CVE-2024-26771: Fixed a null pointer dereference on edma_probe in dmaengine ti edma  (bsc#1222610)
- CVE-2024-26766: Fixed SDMA off-by-one error in _pad_sdma_tx_descs() (bsc#1222726).
- CVE-2024-26764: Fixed IOCB_AIO_RW check in fs/aio before the struct aio_kiocb conversion (bsc#1222721).
- CVE-2024-26763: Fixed user corruption via by writing data with O_DIRECT on device in dm-crypt (bsc#1222720).
- CVE-2024-26754: Fixed an use-after-free and null-ptr-deref in gtp_genl_dump_pdp() in gtp  (bsc#1222632).
- CVE-2024-26751: Fixed ARM/ep93xx terminator to gpiod_lookup_table (bsc#1222724).
- CVE-2024-26744: Fixed null pointer dereference in srpt_service_guid parameter in rdma/srpt (bsc#1222449).
- CVE-2024-26743: Fixed memory leak in qedr_create_user_qp error flow in rdma/qedr (bsc#1222677).
- CVE-2024-26737: Fixed selftests/bpf racing between bpf_timer_cancel_and_free and bpf_timer_cancel (bsc#1222557).
- CVE-2024-26733: Fixed an overflow in arp_req_get() in arp (bsc#1222585).
- CVE-2024-26727: Fixed assertion if a newly created btrfs subvolume already gets read (bsc#1222536).
- CVE-2024-26718: Fixed dm-crypt/dm-verity disable tasklets (bsc#1222416).
- CVE-2024-26704: Fixed a double-free of blocks due to wrong extents moved_len in ext4 (bsc#1222422).
- CVE-2024-26696: Fixed nilfs2 hang in nilfs_lookup_dirty_data_buffers() (bsc#1222549).
- CVE-2024-26689: Fixed a use-after-free in encode_cap_msg() (bsc#1222503).
- CVE-2024-26687: Fixed xen/events close evtchn after mapping cleanup (bsc#1222435).
- CVE-2024-26685: Fixed nilfs2 potential bug in end_buffer_async_write (bsc#1222437).
- CVE-2024-26684: Fixed net/stmmac/xgmac handling of DPP safety error for DMA channels (bsc#1222445).
- CVE-2024-26681: Fixed netdevsim to avoid potential loop in nsim_dev_trap_report_work() (bsc#1222431).
- CVE-2024-26680: Fixed net/atlantic DMA mapping for PTP hwts ring (bsc#1222427).
- CVE-2024-26675: Fixed ppp_async to limit MRU to 64K (bsc#1222379).
- CVE-2024-26673: Fixed netfilter/nft_ct layer 3 and 4 protocol sanitization (bsc#1222368).
- CVE-2024-26671: Fixed blk-mq IO hang from sbitmap wakeup race (bsc#1222357).
- CVE-2024-26660: Fixed drm/amd/display bounds check for stream encoder creation (bsc#1222266).
- CVE-2024-26656: Fixed drm/amdgpu use-after-free bug (bsc#1222307).
- CVE-2024-26610: Fixed memory corruption in wifi/iwlwifi (bsc#1221299).
- CVE-2024-26601: Fixed ext4 buddy bitmap corruption via fast commit replay (bsc#1220342).
- CVE-2024-23850: Fixed double free of anonymous device after snapshot  creation failure (bsc#1219126).
- CVE-2024-23848: Fixed media/cec for possible use-after-free in cec_queue_msg_fh (bsc#1219104).
- CVE-2024-23307: Fixed Integer Overflow or Wraparound vulnerability in x86 and ARM md, raid, raid5 modules (bsc#1219169).
- CVE-2024-22099: Fixed a null-pointer-dereference in rfcomm_check_security (bsc#1219170).
- CVE-2024-0841: Fixed a null pointer dereference in the hugetlbfs_fill_super function in hugetlbfs (HugeTLB pages) functionality (bsc#1219264).
- CVE-2024-0639: Fixed a denial-of-service vulnerability due to a deadlock found in sctp_auto_asconf_init in net/sctp/socket.c (bsc#1218917).
- CVE-2023-6270: Fixed a use-after-free issue in aoecmd_cfg_pkts (bsc#1218562).
- CVE-2023-52652: Fixed NTB for possible name leak in ntb_register_device() (bsc#1223686).
- CVE-2023-52645: Fixed pmdomain/mediatek race conditions with genpd (bsc#1223033).
- CVE-2023-52636: Fixed libceph cursor init when preparing sparse read in msgr2 (bsc#1222247).
- CVE-2023-52635: Fixed PM/devfreq to synchronize devfreq_monitor_[start/stop] (bsc#1222294).
- CVE-2023-52627: Fixed iio:adc:ad7091r exports into IIO_AD7091R namespace (bsc#1222051).
- CVE-2023-52620: Fixed netfilter/nf_tables to disallow timeout for anonymous sets never used from userspace (bsc#1221825).
- CVE-2023-52616: Fixed unexpected pointer access in crypto/lib/mpi in mpi_ec_init (bsc#1221612).
- CVE-2023-52614: Fixed PM/devfreq buffer overflow in trans_stat_show (bsc#1221617).
- CVE-2023-52593: Fixed wifi/wfx possible NULL pointer dereference in wfx_set_mfp_ap() (bsc#1221042).
- CVE-2023-52591: Fixed a possible reiserfs filesystem corruption via directory renaming (bsc#1221044).
- CVE-2023-52590: Fixed a possible ocfs2 filesystem corruption via directory renaming (bsc#1221088).
- CVE-2023-52589: Fixed media/rkisp1 IRQ disable race issue (bsc#1221084).
- CVE-2023-52585: Fixed drm/amdgpu for possible NULL pointer dereference in amdgpu_ras_query_error_status_helper() (bsc#1221080).
- CVE-2023-52561: Fixed arm64/dts/qcom/sdm845-db845c to mark cont splash memory region (bsc#1220935).
- CVE-2023-52503: Fixed tee/amdtee use-after-free vulnerability in amdtee_close_session (bsc#1220915).
- CVE-2023-52488: Fixed serial/sc16is7xx convert from _raw_ to _noinc_ regmap functions for FIFO (bsc#1221162).
- CVE-2022-48662: Fixed a general protection fault (GPF) in i915_perf_open_ioctl (bsc#1223505).
- CVE-2022-48659: Fixed mm/slub to return errno if kmalloc() fails (bsc#1223498).
- CVE-2022-48658: Fixed mm/slub to avoid a problem in flush_cpu_slab()/__free_slab() task context (bsc#1223496).
- CVE-2022-48651: Fixed an out-of-bound bug in ipvlan caused by unset skb->mac_header (bsc#1223513).
- CVE-2022-48642: Fixed netfilter/nf_tables percpu memory leak at nf_tables_addchain() (bsc#1223478).
- CVE-2022-48640: Fixed bonding for possible NULL pointer dereference in bond_rr_gen_slave_id (bsc#1223499).
- CVE-2022-48631: Fixed a bug in ext4, when parsing extents where eh_entries == 0 and eh_depth > 0 (bsc#1223475).
- CVE-2021-47214: Fixed hugetlb/userfaultfd during restore reservation in hugetlb_mcopy_atomic_pte() (bsc#1222710).
- CVE-2021-47202: Fixed NULL pointer dereferences in of_thermal_ functions (bsc#1222878)
- CVE-2021-47200: Fixed drm/prime for possible use-after-free in mmap within drm_gem_ttm_mmap() and drm_gem_ttm_mmap() (bsc#1222838).
- CVE-2021-47195: Fixed use-after-free inside SPI via add_lock mutex (bsc#1222832).
- CVE-2021-47189: Fixed denial of service due to memory ordering issues between normal and ordered work functions in btrfs (bsc#1222706).
- CVE-2021-47185: Fixed a softlockup issue in flush_to_ldisc in tty tty_buffer (bsc#1222669).
- CVE-2021-47183: Fixed a null pointer dereference during link down processing in scsi lpfc (bsc#1192145, bsc#1222664).
- CVE-2021-47182: Fixed scsi_mode_sense() buffer length handling (bsc#1222662).
- CVE-2021-47181: Fixed a null pointer dereference caused by calling platform_get_resource()  (bsc#1222660).
The following non-security bugs were fixed:
- ALSA: firewire-lib: handle quirk to calculate payload quadlets as data block counter (stable-fixes).
- ALSA: hda/realtek - Enable audio jacks of Haier Boyue G42 with ALC269VC (stable-fixes).
- ALSA: hda/realtek - Fix inactive headset mic jack (stable-fixes).
- ALSA: hda/realtek: Add quirk for HP SnowWhite laptops (stable-fixes).
- ALSA: hda/realtek: Fix mute led of HP Laptop 15-da3001TU (stable-fixes).
- ALSA: hda: intel-sdw-acpi: fix usage of device_get_named_child_node() (git-fixes).
- ALSA: scarlett2: Add Focusrite Clarett 2Pre and 4Pre USB support (stable-fixes).
- ALSA: scarlett2: Add Focusrite Clarett+ 2Pre and 4Pre support (stable-fixes).
- ALSA: scarlett2: Add correct product series name to messages (stable-fixes).
- ALSA: scarlett2: Add support for Clarett 8Pre USB (stable-fixes).
- ALSA: scarlett2: Default mixer driver to enabled (stable-fixes).
- ALSA: scarlett2: Move USB IDs out from device_info struct (stable-fixes).
- ASoC: meson: axg-card: make links nonatomic (git-fixes).
- ASoC: meson: axg-tdm-interface: manage formatters in trigger (git-fixes).
- ASoC: meson: cards: select SND_DYNAMIC_MINORS (git-fixes).
- ASoC: soc-core.c: Skip dummy codec when adding platforms (stable-fixes).
- ASoC: tegra: Fix DSPK 16-bit playback (git-fixes).
- ASoC: ti: davinci-mcasp: Fix race condition during probe (git-fixes).
- Bluetooth: Add new quirk for broken read key length on ATS2851 (git-fixes).
- Bluetooth: Fix TOCTOU in HCI debugfs implementation (git-fixes).
- Bluetooth: Fix memory leak in hci_req_sync_complete() (git-fixes).
- Bluetooth: Fix type of len in {l2cap,sco}_sock_getsockopt_old() (stable-fixes).
- Bluetooth: L2CAP: Fix not validating setsockopt user input (git-fixes).
- Bluetooth: RFCOMM: Fix not validating setsockopt user input (git-fixes).
- Bluetooth: SCO: Fix not validating setsockopt user input (git-fixes).
- Bluetooth: add quirk for broken address properties (git-fixes).
- Bluetooth: btintel: Fix null ptr deref in btintel_read_version (stable-fixes).
- Bluetooth: btintel: Fixe build regression (git-fixes).
- Bluetooth: btusb: Add Realtek RTL8852BE support ID 0x0bda:0x4853 (stable-fixes).
- Bluetooth: hci_event: Fix sending HCI_OP_READ_ENC_KEY_SIZE (git-fixes).
- Bluetooth: hci_event: set the conn encrypted before conn establishes (stable-fixes).
- Bluetooth: hci_sock: Fix not validating setsockopt user input (git-fixes).
- Bluetooth: qca: fix NULL-deref on non-serdev suspend (git-fixes).
- Documentation: Add missing documentation for EXPORT_OP flags (stable-fixes).
- HID: intel-ish-hid: ipc: Fix dev_err usage with uninitialized dev->devc (git-fixes).
- HID: logitech-dj: allow mice to use all types of reports (git-fixes).
- HID: uhid: Use READ_ONCE()/WRITE_ONCE() for ->running (stable-fixes).
- Input: synaptics-rmi4 - fail probing if memory allocation for 'phys' fails (stable-fixes).
- NFC: trf7970a: disable all regulators on removal (git-fixes).
- NFS: avoid spurious warning of lost lock that is being unlocked (bsc#1221791).
- PCI/AER: Block runtime suspend when handling errors (git-fixes).
- PCI/DPC: Quirk PIO log size for Intel Ice Lake Root Ports (git-fixes).
- PCI/DPC: Quirk PIO log size for Intel Raptor Lake Root Ports (git-fixes).
- PCI/DPC: Quirk PIO log size for certain Intel Root Ports (git-fixes).
- PCI/PM: Drain runtime-idle callbacks before driver removal (git-fixes).
- PCI: Drop pci_device_remove() test of pci_dev->driver (git-fixes).
- PCI: rpaphp: Error out on busy status from get-sensor-state (bsc#1223369 ltc#205888).
- RAS: Avoid build errors when CONFIG_DEBUG_FS=n (jsc#PED-7619).
- RDMA/cm: Print the old state when cm_destroy_id gets timeout (git-fixes).
- RDMA/cm: add timeout to cm_destroy_id wait (git-fixes)
- Reapply 'drm/qxl: simplify qxl_fence_wait' (stable-fixes).
- Revert 'ACPI: PM: Block ASUS B1400CEAE from suspend to idle by default' (stable-fixes).
- Revert 'drm/qxl: simplify qxl_fence_wait' (git-fixes).
- Revert 'ice: Fix ice VF reset during iavf initialization (jsc#PED-376).' (bsc#1223275) 
- Revert 'usb: cdc-wdm: close race between read and workqueue' (git-fixes).
- Revert 'usb: phy: generic: Get the vbus supply' (git-fixes).
- USB: UAS: return ENODEV when submit urbs fail with device not attached (stable-fixes).
- USB: serial: add device ID for VeriFone adapter (stable-fixes).
- USB: serial: cp210x: add ID for MGP Instruments PDS100 (stable-fixes).
- USB: serial: cp210x: add pid/vid for TDK NC0110013M and MM0110113M (stable-fixes).
- USB: serial: ftdi_sio: add support for GMC Z216C Adapter IR-USB (stable-fixes).
- USB: serial: option: add Fibocom FM135-GL variants (stable-fixes).
- USB: serial: option: add Lonsung U8300/U9300 product (stable-fixes).
- USB: serial: option: add MeiG Smart SLM320 product (stable-fixes).
- USB: serial: option: add Rolling RW101-GL and RW135-GL support (stable-fixes).
- USB: serial: option: add Telit FN920C04 rmnet compositions (stable-fixes).
- USB: serial: option: add support for Fibocom FM650/FG650 (stable-fixes).
- USB: serial: option: support Quectel EM060K sub-models (stable-fixes).
- ahci: asm1064: asm1166: do not limit reported ports (git-fixes).
- ahci: asm1064: correct count of reported ports (stable-fixes).
- arm64: dts: imx8-ss-conn: fix usdhc wrong lpcg clock order (git-fixes)
- arm64: dts: rockchip: Remove unsupported node from the Pinebook Pro (git-fixes)
- arm64: dts: rockchip: enable internal pull-up for Q7_THRM# on RK3399 (git-fixes)
- arm64: dts: rockchip: enable internal pull-up on PCIE_WAKE# for (git-fixes)
- arm64: dts: rockchip: enable internal pull-up on Q7_USB_ID for RK3399 (git-fixes)
- arm64: dts: rockchip: fix rk3328 hdmi ports node (git-fixes)
- arm64: dts: rockchip: fix rk3399 hdmi ports node (git-fixes)
- arm64: hibernate: Fix level3 translation fault in swsusp_save() (git-fixes).
- ax25: fix use-after-free bugs caused by ax25_ds_del_timer (git-fixes).
- batman-adv: Avoid infinite loop trying to resize local TT (git-fixes).
- bcache: Fix __bch_btree_node_alloc to make the failure behavior consistent (git-fixes).
- bcache: Remove dead references to cache_readaheads (git-fixes).
- bcache: Remove unnecessary NULL point check in node allocations (git-fixes).
- bcache: add code comments for bch_btree_node_get() and __bch_btree_node_alloc() (git-fixes).
- bcache: avoid NULL checking to c->root in run_cache_set() (git-fixes).
- bcache: avoid oversize memory allocation by small stripe_size (git-fixes).
- bcache: bset: Fix comment typos (git-fixes).
- bcache: check return value from btree_node_alloc_replacement() (git-fixes).
- bcache: fix NULL pointer reference in cached_dev_detach_finish (git-fixes).
- bcache: fix error info in register_bcache() (git-fixes).
- bcache: fixup bcache_dev_sectors_dirty_add() multithreaded CPU false sharing (git-fixes).
- bcache: fixup btree_cache_wait list damage (git-fixes).
- bcache: fixup init dirty data errors (git-fixes).
- bcache: fixup lock c->root error (git-fixes).
- bcache: fixup multi-threaded bch_sectors_dirty_init() wake-up race (git-fixes).
- bcache: move calc_cached_dev_sectors to proper place on backing device detach (git-fixes).
- bcache: move uapi header bcache.h to bcache code directory (git-fixes).
- bcache: prevent potential division by zero error (git-fixes).
- bcache: remove EXPERIMENTAL for Kconfig option 'Asynchronous device registration' (git-fixes).
- bcache: remove redundant assignment to variable cur_idx (git-fixes).
- bcache: remove the backing_dev_name field from struct cached_dev (git-fixes).
- bcache: remove the cache_dev_name field from struct cache (git-fixes).
- bcache: remove unnecessary flush_workqueue (git-fixes).
- bcache: remove unused bch_mark_cache_readahead function def in stats.h (git-fixes).
- bcache: replace a mistaken IS_ERR() by IS_ERR_OR_NULL() in btree_gc_coalesce() (git-fixes).
- bcache: replace snprintf in show functions with sysfs_emit (git-fixes).
- bcache: revert replacing IS_ERR_OR_NULL with IS_ERR (git-fixes).
- bcache: use bvec_kmap_local in bch_data_verify (git-fixes).
- bcache: use bvec_kmap_local in bio_csum (git-fixes).
- bcache: use default_groups in kobj_type (git-fixes).
- bcache:: fix repeated words in comments (git-fixes).
- ceph: stop copying to iter at EOF on sync reads (bsc#1223068).
- ceph: switch to corrected encoding of max_xattr_size in mdsmap (bsc#1223067).
- clk: Get runtime PM before walking tree during disable_unused (git-fixes).
- clk: Initialize struct clk_core kref earlier (stable-fixes).
- clk: Mark 'all_lists' as const (stable-fixes).
- clk: Print an info line before disabling unused clocks (stable-fixes).
- clk: Remove prepare_lock hold assertion in __clk_release() (git-fixes).
- clk: remove extra empty line (stable-fixes).
- comedi: vmk80xx: fix incomplete endpoint checking (git-fixes).
- dm cache policy smq: ensure IO does not prevent cleaner policy progress (git-fixes).
- dm cache: add cond_resched() to various workqueue loops (git-fixes).
- dm clone: call kmem_cache_destroy() in dm_clone_init() error path (git-fixes).
- dm crypt: add cond_resched() to dmcrypt_write() (git-fixes).
- dm crypt: avoid accessing uninitialized tasklet (git-fixes).
- dm flakey: do not corrupt the zero page (git-fixes).
- dm flakey: fix a bug with 32-bit highmem systems (git-fixes).
- dm flakey: fix a crash with invalid table line (git-fixes).
- dm flakey: fix logic when corrupting a bio (git-fixes).
- dm init: add dm-mod.waitfor to wait for asynchronously probed block devices (git-fixes).
- dm integrity: call kmem_cache_destroy() in dm_integrity_init() error path (git-fixes).
- dm integrity: fix out-of-range warning (git-fixes).
- dm integrity: reduce vmalloc space footprint on 32-bit architectures (git-fixes).
- dm raid: clean up four equivalent goto tags in raid_ctr() (git-fixes).
- dm raid: fix false positive for requeue needed during reshape (git-fixes).
- dm raid: fix missing reconfig_mutex unlock in raid_ctr() error paths (git-fixes).
- dm stats: check for and propagate alloc_percpu failure (git-fixes).
- dm thin metadata: Fix ABBA deadlock by resetting dm_bufio_client (git-fixes).
- dm thin metadata: check fail_io before using data_sm (git-fixes).
- dm thin: add cond_resched() to various workqueue loops (git-fixes).
- dm thin: fix deadlock when swapping to thin device (bsc#1177529).
- dm verity: do not perform FEC for failed readahead IO (git-fixes).
- dm verity: fix error handling for check_at_most_once on FEC (git-fixes).
- dm zoned: free dmz->ddev array in dmz_put_zoned_devices (git-fixes).
- dm-delay: fix a race between delay_presuspend and delay_bio (git-fixes).
- dm-integrity: do not modify bio's immutable bio_vec in integrity_metadata() (git-fixes).
- dm-raid: fix lockdep waring in 'pers->hot_add_disk' (git-fixes).
- dm-verity, dm-crypt: align 'struct bvec_iter' correctly (git-fixes).
- dm-verity: align struct dm_verity_fec_io properly (git-fixes).
- dm: add cond_resched() to dm_wq_work() (git-fixes).
- dm: call the resume method on internal suspend (git-fixes).
- dm: do not lock fs when the map is NULL during suspend or resume (git-fixes).
- dm: do not lock fs when the map is NULL in process of resume (git-fixes).
- dm: remove flush_scheduled_work() during local_exit() (git-fixes).
- dm: send just one event on resize, not two (git-fixes).
- dma: xilinx_dpdma: Fix locking (git-fixes).
- dmaengine: idxd: Fix oops during rmmod on single-CPU platforms (git-fixes).
- dmaengine: owl: fix register access functions (git-fixes).
- dmaengine: tegra186: Fix residual calculation (git-fixes).
- docs: Document the FAN_FS_ERROR event (stable-fixes).
- drm-print: add drm_dbg_driver to improve namespace symmetry (stable-fixes).
- drm/amd/display: Do not recursively call manual trigger programming (stable-fixes).
- drm/amd/display: Fix nanosec stat overflow (stable-fixes).
- drm/amd/display: fix disable otg wa logic in DCN316 (stable-fixes).
- drm/amd/pm: fixes a random hang in S4 for SMU v13.0.4/11 (stable-fixes).
- drm/amdgpu/sdma5.2: use legacy HDP flush for SDMA2/3 (stable-fixes).
- drm/amdgpu: Fix leak when GPU memory allocation fails (stable-fixes).
- drm/amdgpu: Reset dGPU if suspend got aborted (stable-fixes).
- drm/amdgpu: always force full reset for SOC21 (stable-fixes).
- drm/amdgpu: fix incorrect active rb bitmap for gfx11 (stable-fixes).
- drm/amdgpu: fix incorrect number of active RBs for gfx11 (stable-fixes).
- drm/amdgpu: once more fix the call oder in amdgpu_ttm_move() v2 (git-fixes).
- drm/amdgpu: validate the parameters of bo mapping operations more clearly (git-fixes).
- drm/amdkfd: Reset GPU on queue preemption failure (stable-fixes).
- drm/ast: Fix soft lockup (git-fixes).
- drm/client: Fully protect modes[] with dev->mode_config.mutex (stable-fixes).
- drm/i915/cdclk: Fix CDCLK programming order when pipes are active (git-fixes).
- drm/i915/vrr: Disable VRR when using bigjoiner (stable-fixes).
- drm/i915: Disable port sync when bigjoiner is used (stable-fixes).
- drm/msm/dp: fix typo in dp_display_handle_port_status_changed() (git-fixes).
- drm/nouveau/nvkm: add a replacement for nvkm_notify (bsc#1223834)
- drm/panel: ili9341: Respect deferred probe (git-fixes).
- drm/panel: ili9341: Use predefined error codes (git-fixes).
- drm/panel: visionox-rm69299: do not unregister DSI device (git-fixes).
- drm/vc4: do not check if plane->state->fb == state->fb (stable-fixes).
- drm/vmwgfx: Enable DMA mappings with SEV (git-fixes).
- drm/vmwgfx: Fix crtc's atomic check conditional (git-fixes).
- drm/vmwgfx: Fix invalid reads in fence signaled events (git-fixes).
- drm/vmwgfx: Sort primary plane formats by order of preference (git-fixes).
- drm: nv04: Fix out of bounds access (git-fixes).
- drm: panel-orientation-quirks: Add quirk for GPD Win Mini (stable-fixes).
- drm: panel-orientation-quirks: Add quirk for Lenovo Legion Go (stable-fixes).
- dump_stack: Do not get cpu_sync for panic CPU (bsc#1223574).
- fbdev: fix incorrect address computation in deferred IO (git-fixes).
- fbdev: viafb: fix typo in hw_bitblt_1 and hw_bitblt_2 (stable-fixes).
- fbmon: prevent division by zero in fb_videomode_from_videomode() (stable-fixes).
- fix build warning
- fuse: do not unhash root (bsc#1223951).
- fuse: fix root lookup with nonzero generation (bsc#1223950).
- hwmon: (amc6821) add of_match table (stable-fixes).
- i2c: pxa: hide unused icr_bits[] variable (git-fixes).
- i2c: smbus: fix NULL function pointer dereference (git-fixes).
- i40e: Fix VF MAC filter removal (git-fixes).
- idma64: Do not try to serve interrupts when device is powered off (git-fixes).
- iio: accel: mxc4005: Interrupt handling fixes (git-fixes).
- iio:imu: adis16475: Fix sync mode setting (git-fixes).
- init/main.c: Fix potential static_command_line memory overflow (git-fixes).
- iommu/amd: Add a length limitation for the ivrs_acpihid command-line parameter (git-fixes).
- iommu/amd: Fix 'Guest Virtual APIC Table Root Pointer' configuration in IRTE (git-fixes).
- iommu/amd: Fix domain flush size when syncing iotlb (git-fixes).
- iommu/amd: Fix error handling for pdev_pri_ats_enable() (git-fixes).
- iommu/arm-smmu-qcom: Limit the SMR groups to 128 (git-fixes).
- iommu/arm-smmu-v3: Acknowledge pri/event queue overflow if any (git-fixes).
- iommu/fsl: fix all kernel-doc warnings in fsl_pamu.c (git-fixes).
- iommu/iova: Fix alloc iova overflows issue (git-fixes).
- iommu/mediatek: Flush IOTLB completely only if domain has been attached (git-fixes).
- iommu/rockchip: Fix unwind goto issue (git-fixes).
- iommu/sprd: Release dma buffer to avoid memory leak (git-fixes).
- iommu/vt-d: Allocate local memory for page request queue (git-fixes).
- iommu/vt-d: Allow zero SAGAW if second-stage not supported (git-fixes).
- iommu/vt-d: Fix error handling in sva enable/disable paths (git-fixes).
- iommu: Fix error unwind in iommu_group_alloc() (git-fixes).
- ipv6/addrconf: fix a potential refcount underflow for idev (git-fixes).
- kABI: Adjust trace_iterator.wait_index (git-fixes).
- kprobes: Fix double free of kretprobe_holder (bsc#1220901).
- kprobes: Fix possible use-after-free issue on kprobe registration (git-fixes).
- libnvdimm/of_pmem: Use devm_kstrdup instead of kstrdup and check its return value (git-fixes).
- libnvdimm/region: Allow setting align attribute on regions without mappings (git-fixes).
- livepatch: Fix missing newline character in klp_resolve_symbols() (bsc#1223539).
- md/raid1: fix choose next idle in read_balance() (git-fixes).
- md: Do not clear MD_CLOSING when the raid is about to stop (git-fixes).
- md: do not clear MD_RECOVERY_FROZEN for new dm-raid until resume (git-fixes).
- media: cec: core: remove length check of Timer Status (stable-fixes).
- media: sta2x11: fix irq handler cast (stable-fixes).
- mei: me: add arrow lake point H DID (stable-fixes).
- mei: me: add arrow lake point S DID (stable-fixes).
- mei: me: disable RPL-S on SPS and IGN firmwares (git-fixes).
- mm/vmscan: make sure wakeup_kswapd with managed zone (bsc#1223473).
- mmc: sdhci-msm: pervent access to suspended controller (git-fixes).
- mtd: diskonchip: work around ubsan link failure (stable-fixes).
- nd_btt: Make BTT lanes preemptible (git-fixes).
- net: bridge: vlan: fix memory leak in __allowed_ingress (git-fixes).
- net: fix a memleak when uncloning an skb dst and its metadata (git-fixes).
- net: fix skb leak in __skb_tstamp_tx() (git-fixes).
- net: ipv6: ensure we call ipv6_mc_down() at most once (git-fixes).
- net: mld: fix reference count leak in mld_{query | report}_work() (git-fixes).
- net: stream: purge sk_error_queue in sk_stream_kill_queues() (git-fixes).
- net: usb: ax88179_178a: avoid the interface always configured as random address (git-fixes).
- net: usb: ax88179_178a: avoid writing the mac address before first reading (git-fixes).
- net: usb: ax88179_178a: stop lying about skb->truesize (git-fixes).
- net: vlan: fix underflow for the real_dev refcnt (git-fixes).
- netfilter: br_netfilter: Drop dst references before setting (git-fixes).
- netfilter: ipt_CLUSTERIP: fix refcount leak in clusterip_tg_check() (git-fixes).
- netfilter: nft_ct: fix l3num expectations with inet pseudo family (git-fixes).
- nfsd: use __fput_sync() to avoid delayed closing of files (bsc#1223380 bsc#1217408).
- nilfs2: fix OOB in nilfs_set_de_type (git-fixes).
- nilfs2: fix OOB in nilfs_set_de_type (git-fixes).
- nouveau: fix function cast warning (git-fixes).
- nouveau: fix instmem race condition around ptr stores (git-fixes).
- nvdimm/namespace: drop nested variable in create_namespace_pmem() (git-fixes).
- nvdimm: Allow overwrite in the presence of disabled dimms (git-fixes).
- nvdimm: Fix badblocks clear off-by-one error (git-fixes).
- nvdimm: Fix dereference after free in register_nvdimm_pmu() (git-fixes).
- nvdimm: Fix firmware activation deadlock scenarios (git-fixes).
- nvdimm: Fix memleak of pmu attr_groups in unregister_nvdimm_pmu() (git-fixes).
- pci_iounmap(): Fix MMIO mapping leak (git-fixes).
- phy: tegra: xusb: Add API to retrieve the port number of phy (stable-fixes).
- pinctrl: renesas: checker: Limit cfg reg enum checks to provided IDs (stable-fixes).
- platform/x86: touchscreen_dmi: Add an extra entry for a variant of the Chuwi Vi8 tablet (stable-fixes).
- powerpc/kasan: Do not instrument non-maskable or raw interrupts (bsc#1223191).
- powerpc/pseries/iommu: LPAR panics when rebooted with a frozen PE (bsc#1222011 ltc#205900).
- powerpc/rtas: define pr_fmt and convert printk call sites (bsc#1223369 ltc#205888).
- powerpc/rtas: export rtas_error_rc() for reuse (bsc#1223369 ltc#205888).
- powerpc: Avoid nmi_enter/nmi_exit in real mode interrupt (bsc#1221645 ltc#205739 bsc#1223191).
- powerpc: Refactor verification of MSR_RI (bsc#1223191).
- printk: Add this_cpu_in_panic() (bsc#1223574).
- printk: Adjust mapping for 32bit seq macros (bsc#1223574).
- printk: Avoid non-panic CPUs writing to ringbuffer (bsc#1223574).
- printk: Disable passing console lock owner completely during panic() (bsc#1223574).
- printk: Drop console_sem during panic (bsc#1223574).
- printk: Rename abandon_console_lock_in_panic() to other_cpu_in_panic() (bsc#1223574).
- printk: Use prb_first_seq() as base for 32bit seq macros (bsc#1223574).
- printk: Wait for all reserved records with pr_flush() (bsc#1223574).
- printk: nbcon: Relocate 32bit seq macros (bsc#1223574).
- printk: ringbuffer: Clarify special lpos values (bsc#1223574).
- printk: ringbuffer: Cleanup reader terminology (bsc#1223574).
- printk: ringbuffer: Do not skip non-finalized records with prb_next_seq() (bsc#1223574).
- printk: ringbuffer: Improve prb_next_seq() performance (bsc#1223574).
- printk: ringbuffer: Skip non-finalized records in panic (bsc#1223574).
- pstore/zone: Add a null pointer check to the psz_kmsg_read (stable-fixes).
- ring-buffer: Do not set shortest_full when full target is hit (git-fixes).
- ring-buffer: Fix full_waiters_pending in poll (git-fixes).
- ring-buffer: Fix resetting of shortest_full (git-fixes).
- ring-buffer: Fix waking up ring buffer readers (git-fixes).
- ring-buffer: Make wake once of ring_buffer_wait() more robust (git-fixes).
- ring-buffer: Use wait_event_interruptible() in ring_buffer_wait() (git-fixes).
- ring-buffer: use READ_ONCE() to read cpu_buffer->commit_page in concurrent environment (git-fixes).
- s390/cio: Ensure the copied buf is NUL terminated (git-fixes bsc#1223875).
- s390/decompressor: fix misaligned symbol build error (git-fixes bsc#1223785).
- s390/mm: Fix clearing storage keys for huge pages (git-fixes bsc#1223877).
- s390/mm: Fix storage key clearing for guest huge pages (git-fixes bsc#1223878).
- s390/qeth: Fix kernel panic after setting hsuid (git-fixes bsc#1223879).
- s390/scm: fix virtual vs physical address confusion (git-fixes bsc#1223784).
- s390/vdso: Add CFI for RA register to asm macro vdso_func (git-fixes bsc#1223876).
- s390/vdso: drop '-fPIC' from LDFLAGS (git-fixes bsc#1223598).
- s390/zcrypt: fix reference counting on zcrypt card objects (git-fixes bsc#1223595).
- serial/pmac_zilog: Remove flawed mitigation for rx irq flood (git-fixes).
- serial: core: Provide port lock wrappers (stable-fixes).
- serial: core: fix kernel-doc for uart_port_unlock_irqrestore() (git-fixes).
- serial: mxs-auart: add spinlock around changing cts state (git-fixes).
- slimbus: qcom-ngd-ctrl: Add timeout for wait operation (git-fixes).
- speakup: Avoid crash on very long word (git-fixes).
- speakup: Fix 8bit characters from direct synth (git-fixes).
- tcp/udp: Fix memleaks of sk and zerocopy skbs with TX timestamp (git-fixes).
- thunderbolt: Avoid notify PM core about runtime PM resume (stable-fixes).
- thunderbolt: Fix wake configurations after device unplug (stable-fixes).
- tracing/net_sched: Fix tracepoints that save qdisc_dev() as a string (git-fixes).
- tracing/ring-buffer: Fix wait_on_pipe() race (git-fixes).
- tracing: Have saved_cmdlines arrays all in one allocation (git-fixes).
- tracing: Remove precision vsnprintf() check from print event (git-fixes).
- tracing: Show size of requested perf buffer (git-fixes).
- tracing: Use .flush() call to wake up readers (git-fixes).
- usb: Disable USB3 LPM at shutdown (stable-fixes).
- usb: Fix regression caused by invalid ep0 maxpacket in virtual SuperSpeed device (git-fixes).
- usb: dwc2: host: Fix dereference issue in DDMA completion flow (git-fixes).
- usb: gadget: composite: fix OS descriptors w_value logic (git-fixes).
- usb: gadget: f_fs: Fix a race condition when processing setup packets (git-fixes).
- usb: gadget: f_ncm: Fix UAF ncm object at re-bind after usb ep transport error (stable-fixes).
- usb: gadget: tegra-xudc: Fix USB3 PHY retrieval logic (git-fixes).
- usb: ohci: Prevent missed ohci interrupts (git-fixes).
- usb: sl811-hcd: only defined function checkdone if QUIRK2 is defined (stable-fixes).
- usb: typec: tcpci: add generic tcpci fallback compatible (stable-fixes).
- usb: typec: tcpm: Check for port partner validity before consuming it (git-fixes).
- usb: typec: tcpm: unregister existing source caps before re-registration (bsc#1220569).
- usb: typec: ucsi: Ack unsupported commands (stable-fixes).
- usb: typec: ucsi: Clear UCSI_CCI_RESET_COMPLETE before reset (stable-fixes).
- usb: typec: ucsi: Fix connector check on init (git-fixes).
- usb: udc: remove warning when queue disabled ep (stable-fixes).
- vdpa/mlx5: Allow CVQ size changes (git-fixes).
- virtio: treat alloc_dax() -EOPNOTSUPP failure as non-fatal (bsc#1223949).
- wifi: ath9k: fix LNA selection in ath_ant_try_scan() (stable-fixes).
- wifi: iwlwifi: mvm: remove old PASN station when adding a new one (git-fixes).
- wifi: iwlwifi: mvm: return uid from iwl_mvm_build_scan_cmd (git-fixes).
- wifi: mac80211: check/clear fast rx for non-4addr sta VLAN changes (stable-fixes).
- wifi: nl80211: do not free NULL coalescing rule (git-fixes).
- x86/cpufeatures: Fix dependencies for GFNI, VAES, and VPCLMULQDQ (git-fixes).
- x86/mm: Ensure input to pfn_to_kaddr() is treated as a 64-bit type (jsc#PED-7167 git-fixes).
- x86/sev: Skip ROM range scans and validation for SEV-SNP guests (jsc#PED-7167 git-fixes).
- x86/xen: Add some null pointer checking to smp.c (git-fixes).
- x86/xen: add CPU dependencies for 32-bit build (git-fixes).
- x86/xen: fix percpu vcpu_info allocation (git-fixes).
- xen-netback: properly sync TX responses (git-fixes).
- xen-netfront: Add missing skb_mark_for_recycle (git-fixes).
- xen/gntdev: Fix the abuse of underlying struct page in DMA-buf import (git-fixes).
- xen/xenbus: document will_handle argument for xenbus_watch_path() (git-fixes).
- xfrm6: fix inet6_dev refcount underflow problem (git-fixes).
    Patchnames
SUSE-2024-1659,SUSE-SLE-Micro-5.5-2024-1659,SUSE-SLE-Module-Basesystem-15-SP5-2024-1659,SUSE-SLE-Module-Development-Tools-15-SP5-2024-1659,SUSE-SLE-Module-Legacy-15-SP5-2024-1659,SUSE-SLE-Module-Live-Patching-15-SP5-2024-1659,SUSE-SLE-Product-HA-15-SP5-2024-1659,SUSE-SLE-Product-WE-15-SP5-2024-1659,openSUSE-SLE-15.5-2024-1659
    Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
    {
  "document": {
    "aggregate_severity": {
      "namespace": "https://www.suse.com/support/security/rating/",
      "text": "important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright 2024 SUSE LLC. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Security update for the Linux Kernel",
        "title": "Title of the patch"
      },
      {
        "category": "description",
        "text": "\nThe SUSE Linux Enterprise 15 SP5 kernel was updated to receive various security bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2024-26760: Fixed scsi/target/pscsi bio_put() for error case (bsc#1222596).\n- CVE-2024-27389: Fixed pstore inode handling with d_invalidate() (bsc#1223705).\n- CVE-2024-27062: Fixed nouveau lock inside client object tree (bsc#1223834).\n- CVE-2024-27056: Fixed wifi/iwlwifi/mvm to ensure offloading TID queue exists (bsc#1223822).\n- CVE-2024-27046: Fixed nfp/flower handling acti_netdevs allocation failure (bsc#1223827).\n- CVE-2024-27043: Fixed a use-after-free in edia/dvbdev in different places (bsc#1223824).\n- CVE-2024-27041: Fixed drm/amd/display NULL checks for adev-\u003edm.dc in amdgpu_dm_fini() (bsc#1223714).\n- CVE-2024-27039: Fixed clk/hisilicon/hi3559a an erroneous devm_kfree() (bsc#1223821).\n- CVE-2024-27038: Fixed clk_core_get NULL pointer dereference (bsc#1223816).\n- CVE-2024-27030: Fixed octeontx2-af to use separate handlers for interrupts (bsc#1223790).\n- CVE-2024-27014: Fixed net/mlx5e to prevent deadlock while disabling aRFS (bsc#1223735).\n- CVE-2024-27013: Fixed tun limit printing rate when illegal packet received by tun device (bsc#1223745).\n- CVE-2024-26993: Fixed fs/sysfs reference leak in sysfs_break_active_protection() (bsc#1223693).\n- CVE-2024-26982: Fixed Squashfs inode number check not to be an invalid value of zero (bsc#1223634).\n- CVE-2024-26970: Fixed clk/qcom/gcc-ipq6018 termination of frequency table arrays (bsc#1223644).\n- CVE-2024-26969: Fixed clk/qcom/gcc-ipq8074 termination of frequency table arrays (bsc#1223645).\n- CVE-2024-26966: Fixed clk/qcom/mmcc-apq8084 termination of frequency table arrays (bsc#1223646).\n- CVE-2024-26965: Fixed clk/qcom/mmcc-msm8974 termination of frequency table arrays (bsc#1223648).\n- CVE-2024-26960: Fixed mm/swap race between free_swap_and_cache() and swapoff() (bsc#1223655).\n- CVE-2024-26951: Fixed wireguard/netlink check for dangling peer via is_dead instead of empty list (bsc#1223660).\n- CVE-2024-26950: Fixed wireguard/netlink to access device through ctx instead of peer (bsc#1223661).\n- CVE-2024-26948: Fixed drm/amd/display by adding dc_state NULL check in dc_state_release (bsc#1223664).\n- CVE-2024-26927: Fixed ASoC/SOF bounds checking to firmware data Smatch (bsc#1223525).\n- CVE-2024-26901: Fixed do_sys_name_to_handle() to use kzalloc() to prevent kernel-infoleak (bsc#1223198).\n- CVE-2024-26896: Fixed wifi/wfx memory leak when starting AP (bsc#1223042).\n- CVE-2024-26893: Fixed firmware/arm_scmi for possible double free in SMC transport cleanup path (bsc#1223196).\n- CVE-2024-26885: Fixed bpf DEVMAP_HASH overflow check on 32-bit arches (bsc#1223190).\n- CVE-2024-26884: Fixed bpf hashtab overflow check on 32-bit arches (bsc#1223189).\n- CVE-2024-26883: Fixed bpf stackmap overflow check on 32-bit arches (bsc#1223035).\n- CVE-2024-26882: Fixed net/ip_tunnel to make sure to pull inner header in ip_tunnel_rcv() (bsc#1223034).\n- CVE-2024-26881: Fixed net/hns3 kernel crash when 1588 is received on HIP08 devices (bsc#1223041).\n- CVE-2024-26879: Fixed clk/meson by adding missing clocks to axg_clk_regmaps (bsc#1223066).\n- CVE-2024-26878: Fixed quota for potential NULL pointer dereference (bsc#1223060).\n- CVE-2024-26866: Fixed spi/spi-fsl-lpspi by removing redundant spi_controller_put call (bsc#1223024).\n- CVE-2024-26862: Fixed packet annotate data-races around ignore_outgoing (bsc#1223111).\n- CVE-2024-26861: Fixed wireguard/receive annotate data-race around receiving_counter.counter (bsc#1223076).\n- CVE-2024-26857: Fixed geneve to make sure to pull inner header in geneve_rx() (bsc#1223058).\n- CVE-2024-26856: Fixed use-after-free inside sparx5_del_mact_entry (bsc#1223052).\n- CVE-2024-26855: Fixed net/ice potential NULL pointer dereference in ice_bridge_setlink() (bsc#1223051).\n- CVE-2024-26853: Fixed igc returning frame twice in XDP_REDIRECT (bsc#1223061).\n- CVE-2024-26852: Fixed net/ipv6 to avoid possible UAF in ip6_route_mpath_notify() (bsc#1223057).\n- CVE-2024-26848: Fixed afs endless loop in directory parsing (bsc#1223030).\n- CVE-2024-26836: Fixed platform/x86/think-lmi password opcode ordering for workstations (bsc#1222968).\n- CVE-2024-26830: Fixed i40e to not allow untrusted VF to remove administratively set MAC (bsc#1223012).\n- CVE-2024-26817: Fixed amdkfd to use calloc instead of kzalloc to avoid integer overflow (bsc#1222812).\n- CVE-2024-26816: Fixed relocations in .notes section when building with CONFIG_XEN_PV=y by ignoring them (bsc#1222624).\n- CVE-2024-26807: Fixed spi/cadence-qspi NULL pointer reference in runtime PM hooks (bsc#1222801).\n- CVE-2024-26805: Fixed a kernel-infoleak-after-free in __skb_datagram_iter in netlink  (bsc#1222630).\n- CVE-2024-26793: Fixed an use-after-free and null-ptr-deref in gtp_newlink() in gtp  (bsc#1222428).\n- CVE-2024-26783: Fixed mm/vmscan bug when calling wakeup_kswapd() with a wrong zone index (bsc#1222615).\n- CVE-2024-26773: Fixed ext4 block allocation from corrupted group in ext4_mb_try_best_found() (bsc#1222618).\n- CVE-2024-26772: Fixed ext4 to avoid allocating blocks from corrupted group in ext4_mb_find_by_goal() (bsc#1222613).\n- CVE-2024-26771: Fixed a null pointer dereference on edma_probe in dmaengine ti edma  (bsc#1222610)\n- CVE-2024-26766: Fixed SDMA off-by-one error in _pad_sdma_tx_descs() (bsc#1222726).\n- CVE-2024-26764: Fixed IOCB_AIO_RW check in fs/aio before the struct aio_kiocb conversion (bsc#1222721).\n- CVE-2024-26763: Fixed user corruption via by writing data with O_DIRECT on device in dm-crypt (bsc#1222720).\n- CVE-2024-26754: Fixed an use-after-free and null-ptr-deref in gtp_genl_dump_pdp() in gtp  (bsc#1222632).\n- CVE-2024-26751: Fixed ARM/ep93xx terminator to gpiod_lookup_table (bsc#1222724).\n- CVE-2024-26744: Fixed null pointer dereference in srpt_service_guid parameter in rdma/srpt (bsc#1222449).\n- CVE-2024-26743: Fixed memory leak in qedr_create_user_qp error flow in rdma/qedr (bsc#1222677).\n- CVE-2024-26737: Fixed selftests/bpf racing between bpf_timer_cancel_and_free and bpf_timer_cancel (bsc#1222557).\n- CVE-2024-26733: Fixed an overflow in arp_req_get() in arp (bsc#1222585).\n- CVE-2024-26727: Fixed assertion if a newly created btrfs subvolume already gets read (bsc#1222536).\n- CVE-2024-26718: Fixed dm-crypt/dm-verity disable tasklets (bsc#1222416).\n- CVE-2024-26704: Fixed a double-free of blocks due to wrong extents moved_len in ext4 (bsc#1222422).\n- CVE-2024-26696: Fixed nilfs2 hang in nilfs_lookup_dirty_data_buffers() (bsc#1222549).\n- CVE-2024-26689: Fixed a use-after-free in encode_cap_msg() (bsc#1222503).\n- CVE-2024-26687: Fixed xen/events close evtchn after mapping cleanup (bsc#1222435).\n- CVE-2024-26685: Fixed nilfs2 potential bug in end_buffer_async_write (bsc#1222437).\n- CVE-2024-26684: Fixed net/stmmac/xgmac handling of DPP safety error for DMA channels (bsc#1222445).\n- CVE-2024-26681: Fixed netdevsim to avoid potential loop in nsim_dev_trap_report_work() (bsc#1222431).\n- CVE-2024-26680: Fixed net/atlantic DMA mapping for PTP hwts ring (bsc#1222427).\n- CVE-2024-26675: Fixed ppp_async to limit MRU to 64K (bsc#1222379).\n- CVE-2024-26673: Fixed netfilter/nft_ct layer 3 and 4 protocol sanitization (bsc#1222368).\n- CVE-2024-26671: Fixed blk-mq IO hang from sbitmap wakeup race (bsc#1222357).\n- CVE-2024-26660: Fixed drm/amd/display bounds check for stream encoder creation (bsc#1222266).\n- CVE-2024-26656: Fixed drm/amdgpu use-after-free bug (bsc#1222307).\n- CVE-2024-26610: Fixed memory corruption in wifi/iwlwifi (bsc#1221299).\n- CVE-2024-26601: Fixed ext4 buddy bitmap corruption via fast commit replay (bsc#1220342).\n- CVE-2024-23850: Fixed double free of anonymous device after snapshot  creation failure (bsc#1219126).\n- CVE-2024-23848: Fixed media/cec for possible use-after-free in cec_queue_msg_fh (bsc#1219104).\n- CVE-2024-23307: Fixed Integer Overflow or Wraparound vulnerability in x86 and ARM md, raid, raid5 modules (bsc#1219169).\n- CVE-2024-22099: Fixed a null-pointer-dereference in rfcomm_check_security (bsc#1219170).\n- CVE-2024-0841: Fixed a null pointer dereference in the hugetlbfs_fill_super function in hugetlbfs (HugeTLB pages) functionality (bsc#1219264).\n- CVE-2024-0639: Fixed a denial-of-service vulnerability due to a deadlock found in sctp_auto_asconf_init in net/sctp/socket.c (bsc#1218917).\n- CVE-2023-6270: Fixed a use-after-free issue in aoecmd_cfg_pkts (bsc#1218562).\n- CVE-2023-52652: Fixed NTB for possible name leak in ntb_register_device() (bsc#1223686).\n- CVE-2023-52645: Fixed pmdomain/mediatek race conditions with genpd (bsc#1223033).\n- CVE-2023-52636: Fixed libceph cursor init when preparing sparse read in msgr2 (bsc#1222247).\n- CVE-2023-52635: Fixed PM/devfreq to synchronize devfreq_monitor_[start/stop] (bsc#1222294).\n- CVE-2023-52627: Fixed iio:adc:ad7091r exports into IIO_AD7091R namespace (bsc#1222051).\n- CVE-2023-52620: Fixed netfilter/nf_tables to disallow timeout for anonymous sets never used from userspace (bsc#1221825).\n- CVE-2023-52616: Fixed unexpected pointer access in crypto/lib/mpi in mpi_ec_init (bsc#1221612).\n- CVE-2023-52614: Fixed PM/devfreq buffer overflow in trans_stat_show (bsc#1221617).\n- CVE-2023-52593: Fixed wifi/wfx possible NULL pointer dereference in wfx_set_mfp_ap() (bsc#1221042).\n- CVE-2023-52591: Fixed a possible reiserfs filesystem corruption via directory renaming (bsc#1221044).\n- CVE-2023-52590: Fixed a possible ocfs2 filesystem corruption via directory renaming (bsc#1221088).\n- CVE-2023-52589: Fixed media/rkisp1 IRQ disable race issue (bsc#1221084).\n- CVE-2023-52585: Fixed drm/amdgpu for possible NULL pointer dereference in amdgpu_ras_query_error_status_helper() (bsc#1221080).\n- CVE-2023-52561: Fixed arm64/dts/qcom/sdm845-db845c to mark cont splash memory region (bsc#1220935).\n- CVE-2023-52503: Fixed tee/amdtee use-after-free vulnerability in amdtee_close_session (bsc#1220915).\n- CVE-2023-52488: Fixed serial/sc16is7xx convert from _raw_ to _noinc_ regmap functions for FIFO (bsc#1221162).\n- CVE-2022-48662: Fixed a general protection fault (GPF) in i915_perf_open_ioctl (bsc#1223505).\n- CVE-2022-48659: Fixed mm/slub to return errno if kmalloc() fails (bsc#1223498).\n- CVE-2022-48658: Fixed mm/slub to avoid a problem in flush_cpu_slab()/__free_slab() task context (bsc#1223496).\n- CVE-2022-48651: Fixed an out-of-bound bug in ipvlan caused by unset skb-\u003emac_header (bsc#1223513).\n- CVE-2022-48642: Fixed netfilter/nf_tables percpu memory leak at nf_tables_addchain() (bsc#1223478).\n- CVE-2022-48640: Fixed bonding for possible NULL pointer dereference in bond_rr_gen_slave_id (bsc#1223499).\n- CVE-2022-48631: Fixed a bug in ext4, when parsing extents where eh_entries == 0 and eh_depth \u003e 0 (bsc#1223475).\n- CVE-2021-47214: Fixed hugetlb/userfaultfd during restore reservation in hugetlb_mcopy_atomic_pte() (bsc#1222710).\n- CVE-2021-47202: Fixed NULL pointer dereferences in of_thermal_ functions (bsc#1222878)\n- CVE-2021-47200: Fixed drm/prime for possible use-after-free in mmap within drm_gem_ttm_mmap() and drm_gem_ttm_mmap() (bsc#1222838).\n- CVE-2021-47195: Fixed use-after-free inside SPI via add_lock mutex (bsc#1222832).\n- CVE-2021-47189: Fixed denial of service due to memory ordering issues between normal and ordered work functions in btrfs (bsc#1222706).\n- CVE-2021-47185: Fixed a softlockup issue in flush_to_ldisc in tty tty_buffer (bsc#1222669).\n- CVE-2021-47183: Fixed a null pointer dereference during link down processing in scsi lpfc (bsc#1192145, bsc#1222664).\n- CVE-2021-47182: Fixed scsi_mode_sense() buffer length handling (bsc#1222662).\n- CVE-2021-47181: Fixed a null pointer dereference caused by calling platform_get_resource()  (bsc#1222660).\n\nThe following non-security bugs were fixed:\n\n- ALSA: firewire-lib: handle quirk to calculate payload quadlets as data block counter (stable-fixes).\n- ALSA: hda/realtek - Enable audio jacks of Haier Boyue G42 with ALC269VC (stable-fixes).\n- ALSA: hda/realtek - Fix inactive headset mic jack (stable-fixes).\n- ALSA: hda/realtek: Add quirk for HP SnowWhite laptops (stable-fixes).\n- ALSA: hda/realtek: Fix mute led of HP Laptop 15-da3001TU (stable-fixes).\n- ALSA: hda: intel-sdw-acpi: fix usage of device_get_named_child_node() (git-fixes).\n- ALSA: scarlett2: Add Focusrite Clarett 2Pre and 4Pre USB support (stable-fixes).\n- ALSA: scarlett2: Add Focusrite Clarett+ 2Pre and 4Pre support (stable-fixes).\n- ALSA: scarlett2: Add correct product series name to messages (stable-fixes).\n- ALSA: scarlett2: Add support for Clarett 8Pre USB (stable-fixes).\n- ALSA: scarlett2: Default mixer driver to enabled (stable-fixes).\n- ALSA: scarlett2: Move USB IDs out from device_info struct (stable-fixes).\n- ASoC: meson: axg-card: make links nonatomic (git-fixes).\n- ASoC: meson: axg-tdm-interface: manage formatters in trigger (git-fixes).\n- ASoC: meson: cards: select SND_DYNAMIC_MINORS (git-fixes).\n- ASoC: soc-core.c: Skip dummy codec when adding platforms (stable-fixes).\n- ASoC: tegra: Fix DSPK 16-bit playback (git-fixes).\n- ASoC: ti: davinci-mcasp: Fix race condition during probe (git-fixes).\n- Bluetooth: Add new quirk for broken read key length on ATS2851 (git-fixes).\n- Bluetooth: Fix TOCTOU in HCI debugfs implementation (git-fixes).\n- Bluetooth: Fix memory leak in hci_req_sync_complete() (git-fixes).\n- Bluetooth: Fix type of len in {l2cap,sco}_sock_getsockopt_old() (stable-fixes).\n- Bluetooth: L2CAP: Fix not validating setsockopt user input (git-fixes).\n- Bluetooth: RFCOMM: Fix not validating setsockopt user input (git-fixes).\n- Bluetooth: SCO: Fix not validating setsockopt user input (git-fixes).\n- Bluetooth: add quirk for broken address properties (git-fixes).\n- Bluetooth: btintel: Fix null ptr deref in btintel_read_version (stable-fixes).\n- Bluetooth: btintel: Fixe build regression (git-fixes).\n- Bluetooth: btusb: Add Realtek RTL8852BE support ID 0x0bda:0x4853 (stable-fixes).\n- Bluetooth: hci_event: Fix sending HCI_OP_READ_ENC_KEY_SIZE (git-fixes).\n- Bluetooth: hci_event: set the conn encrypted before conn establishes (stable-fixes).\n- Bluetooth: hci_sock: Fix not validating setsockopt user input (git-fixes).\n- Bluetooth: qca: fix NULL-deref on non-serdev suspend (git-fixes).\n- Documentation: Add missing documentation for EXPORT_OP flags (stable-fixes).\n- HID: intel-ish-hid: ipc: Fix dev_err usage with uninitialized dev-\u003edevc (git-fixes).\n- HID: logitech-dj: allow mice to use all types of reports (git-fixes).\n- HID: uhid: Use READ_ONCE()/WRITE_ONCE() for -\u003erunning (stable-fixes).\n- Input: synaptics-rmi4 - fail probing if memory allocation for \u0027phys\u0027 fails (stable-fixes).\n- NFC: trf7970a: disable all regulators on removal (git-fixes).\n- NFS: avoid spurious warning of lost lock that is being unlocked (bsc#1221791).\n- PCI/AER: Block runtime suspend when handling errors (git-fixes).\n- PCI/DPC: Quirk PIO log size for Intel Ice Lake Root Ports (git-fixes).\n- PCI/DPC: Quirk PIO log size for Intel Raptor Lake Root Ports (git-fixes).\n- PCI/DPC: Quirk PIO log size for certain Intel Root Ports (git-fixes).\n- PCI/PM: Drain runtime-idle callbacks before driver removal (git-fixes).\n- PCI: Drop pci_device_remove() test of pci_dev-\u003edriver (git-fixes).\n- PCI: rpaphp: Error out on busy status from get-sensor-state (bsc#1223369 ltc#205888).\n- RAS: Avoid build errors when CONFIG_DEBUG_FS=n (jsc#PED-7619).\n- RDMA/cm: Print the old state when cm_destroy_id gets timeout (git-fixes).\n- RDMA/cm: add timeout to cm_destroy_id wait (git-fixes)\n- Reapply \u0027drm/qxl: simplify qxl_fence_wait\u0027 (stable-fixes).\n- Revert \u0027ACPI: PM: Block ASUS B1400CEAE from suspend to idle by default\u0027 (stable-fixes).\n- Revert \u0027drm/qxl: simplify qxl_fence_wait\u0027 (git-fixes).\n- Revert \u0027ice: Fix ice VF reset during iavf initialization (jsc#PED-376).\u0027 (bsc#1223275) \n- Revert \u0027usb: cdc-wdm: close race between read and workqueue\u0027 (git-fixes).\n- Revert \u0027usb: phy: generic: Get the vbus supply\u0027 (git-fixes).\n- USB: UAS: return ENODEV when submit urbs fail with device not attached (stable-fixes).\n- USB: serial: add device ID for VeriFone adapter (stable-fixes).\n- USB: serial: cp210x: add ID for MGP Instruments PDS100 (stable-fixes).\n- USB: serial: cp210x: add pid/vid for TDK NC0110013M and MM0110113M (stable-fixes).\n- USB: serial: ftdi_sio: add support for GMC Z216C Adapter IR-USB (stable-fixes).\n- USB: serial: option: add Fibocom FM135-GL variants (stable-fixes).\n- USB: serial: option: add Lonsung U8300/U9300 product (stable-fixes).\n- USB: serial: option: add MeiG Smart SLM320 product (stable-fixes).\n- USB: serial: option: add Rolling RW101-GL and RW135-GL support (stable-fixes).\n- USB: serial: option: add Telit FN920C04 rmnet compositions (stable-fixes).\n- USB: serial: option: add support for Fibocom FM650/FG650 (stable-fixes).\n- USB: serial: option: support Quectel EM060K sub-models (stable-fixes).\n- ahci: asm1064: asm1166: do not limit reported ports (git-fixes).\n- ahci: asm1064: correct count of reported ports (stable-fixes).\n- arm64: dts: imx8-ss-conn: fix usdhc wrong lpcg clock order (git-fixes)\n- arm64: dts: rockchip: Remove unsupported node from the Pinebook Pro (git-fixes)\n- arm64: dts: rockchip: enable internal pull-up for Q7_THRM# on RK3399 (git-fixes)\n- arm64: dts: rockchip: enable internal pull-up on PCIE_WAKE# for (git-fixes)\n- arm64: dts: rockchip: enable internal pull-up on Q7_USB_ID for RK3399 (git-fixes)\n- arm64: dts: rockchip: fix rk3328 hdmi ports node (git-fixes)\n- arm64: dts: rockchip: fix rk3399 hdmi ports node (git-fixes)\n- arm64: hibernate: Fix level3 translation fault in swsusp_save() (git-fixes).\n- ax25: fix use-after-free bugs caused by ax25_ds_del_timer (git-fixes).\n- batman-adv: Avoid infinite loop trying to resize local TT (git-fixes).\n- bcache: Fix __bch_btree_node_alloc to make the failure behavior consistent (git-fixes).\n- bcache: Remove dead references to cache_readaheads (git-fixes).\n- bcache: Remove unnecessary NULL point check in node allocations (git-fixes).\n- bcache: add code comments for bch_btree_node_get() and __bch_btree_node_alloc() (git-fixes).\n- bcache: avoid NULL checking to c-\u003eroot in run_cache_set() (git-fixes).\n- bcache: avoid oversize memory allocation by small stripe_size (git-fixes).\n- bcache: bset: Fix comment typos (git-fixes).\n- bcache: check return value from btree_node_alloc_replacement() (git-fixes).\n- bcache: fix NULL pointer reference in cached_dev_detach_finish (git-fixes).\n- bcache: fix error info in register_bcache() (git-fixes).\n- bcache: fixup bcache_dev_sectors_dirty_add() multithreaded CPU false sharing (git-fixes).\n- bcache: fixup btree_cache_wait list damage (git-fixes).\n- bcache: fixup init dirty data errors (git-fixes).\n- bcache: fixup lock c-\u003eroot error (git-fixes).\n- bcache: fixup multi-threaded bch_sectors_dirty_init() wake-up race (git-fixes).\n- bcache: move calc_cached_dev_sectors to proper place on backing device detach (git-fixes).\n- bcache: move uapi header bcache.h to bcache code directory (git-fixes).\n- bcache: prevent potential division by zero error (git-fixes).\n- bcache: remove EXPERIMENTAL for Kconfig option \u0027Asynchronous device registration\u0027 (git-fixes).\n- bcache: remove redundant assignment to variable cur_idx (git-fixes).\n- bcache: remove the backing_dev_name field from struct cached_dev (git-fixes).\n- bcache: remove the cache_dev_name field from struct cache (git-fixes).\n- bcache: remove unnecessary flush_workqueue (git-fixes).\n- bcache: remove unused bch_mark_cache_readahead function def in stats.h (git-fixes).\n- bcache: replace a mistaken IS_ERR() by IS_ERR_OR_NULL() in btree_gc_coalesce() (git-fixes).\n- bcache: replace snprintf in show functions with sysfs_emit (git-fixes).\n- bcache: revert replacing IS_ERR_OR_NULL with IS_ERR (git-fixes).\n- bcache: use bvec_kmap_local in bch_data_verify (git-fixes).\n- bcache: use bvec_kmap_local in bio_csum (git-fixes).\n- bcache: use default_groups in kobj_type (git-fixes).\n- bcache:: fix repeated words in comments (git-fixes).\n- ceph: stop copying to iter at EOF on sync reads (bsc#1223068).\n- ceph: switch to corrected encoding of max_xattr_size in mdsmap (bsc#1223067).\n- clk: Get runtime PM before walking tree during disable_unused (git-fixes).\n- clk: Initialize struct clk_core kref earlier (stable-fixes).\n- clk: Mark \u0027all_lists\u0027 as const (stable-fixes).\n- clk: Print an info line before disabling unused clocks (stable-fixes).\n- clk: Remove prepare_lock hold assertion in __clk_release() (git-fixes).\n- clk: remove extra empty line (stable-fixes).\n- comedi: vmk80xx: fix incomplete endpoint checking (git-fixes).\n- dm cache policy smq: ensure IO does not prevent cleaner policy progress (git-fixes).\n- dm cache: add cond_resched() to various workqueue loops (git-fixes).\n- dm clone: call kmem_cache_destroy() in dm_clone_init() error path (git-fixes).\n- dm crypt: add cond_resched() to dmcrypt_write() (git-fixes).\n- dm crypt: avoid accessing uninitialized tasklet (git-fixes).\n- dm flakey: do not corrupt the zero page (git-fixes).\n- dm flakey: fix a bug with 32-bit highmem systems (git-fixes).\n- dm flakey: fix a crash with invalid table line (git-fixes).\n- dm flakey: fix logic when corrupting a bio (git-fixes).\n- dm init: add dm-mod.waitfor to wait for asynchronously probed block devices (git-fixes).\n- dm integrity: call kmem_cache_destroy() in dm_integrity_init() error path (git-fixes).\n- dm integrity: fix out-of-range warning (git-fixes).\n- dm integrity: reduce vmalloc space footprint on 32-bit architectures (git-fixes).\n- dm raid: clean up four equivalent goto tags in raid_ctr() (git-fixes).\n- dm raid: fix false positive for requeue needed during reshape (git-fixes).\n- dm raid: fix missing reconfig_mutex unlock in raid_ctr() error paths (git-fixes).\n- dm stats: check for and propagate alloc_percpu failure (git-fixes).\n- dm thin metadata: Fix ABBA deadlock by resetting dm_bufio_client (git-fixes).\n- dm thin metadata: check fail_io before using data_sm (git-fixes).\n- dm thin: add cond_resched() to various workqueue loops (git-fixes).\n- dm thin: fix deadlock when swapping to thin device (bsc#1177529).\n- dm verity: do not perform FEC for failed readahead IO (git-fixes).\n- dm verity: fix error handling for check_at_most_once on FEC (git-fixes).\n- dm zoned: free dmz-\u003eddev array in dmz_put_zoned_devices (git-fixes).\n- dm-delay: fix a race between delay_presuspend and delay_bio (git-fixes).\n- dm-integrity: do not modify bio\u0027s immutable bio_vec in integrity_metadata() (git-fixes).\n- dm-raid: fix lockdep waring in \u0027pers-\u003ehot_add_disk\u0027 (git-fixes).\n- dm-verity, dm-crypt: align \u0027struct bvec_iter\u0027 correctly (git-fixes).\n- dm-verity: align struct dm_verity_fec_io properly (git-fixes).\n- dm: add cond_resched() to dm_wq_work() (git-fixes).\n- dm: call the resume method on internal suspend (git-fixes).\n- dm: do not lock fs when the map is NULL during suspend or resume (git-fixes).\n- dm: do not lock fs when the map is NULL in process of resume (git-fixes).\n- dm: remove flush_scheduled_work() during local_exit() (git-fixes).\n- dm: send just one event on resize, not two (git-fixes).\n- dma: xilinx_dpdma: Fix locking (git-fixes).\n- dmaengine: idxd: Fix oops during rmmod on single-CPU platforms (git-fixes).\n- dmaengine: owl: fix register access functions (git-fixes).\n- dmaengine: tegra186: Fix residual calculation (git-fixes).\n- docs: Document the FAN_FS_ERROR event (stable-fixes).\n- drm-print: add drm_dbg_driver to improve namespace symmetry (stable-fixes).\n- drm/amd/display: Do not recursively call manual trigger programming (stable-fixes).\n- drm/amd/display: Fix nanosec stat overflow (stable-fixes).\n- drm/amd/display: fix disable otg wa logic in DCN316 (stable-fixes).\n- drm/amd/pm: fixes a random hang in S4 for SMU v13.0.4/11 (stable-fixes).\n- drm/amdgpu/sdma5.2: use legacy HDP flush for SDMA2/3 (stable-fixes).\n- drm/amdgpu: Fix leak when GPU memory allocation fails (stable-fixes).\n- drm/amdgpu: Reset dGPU if suspend got aborted (stable-fixes).\n- drm/amdgpu: always force full reset for SOC21 (stable-fixes).\n- drm/amdgpu: fix incorrect active rb bitmap for gfx11 (stable-fixes).\n- drm/amdgpu: fix incorrect number of active RBs for gfx11 (stable-fixes).\n- drm/amdgpu: once more fix the call oder in amdgpu_ttm_move() v2 (git-fixes).\n- drm/amdgpu: validate the parameters of bo mapping operations more clearly (git-fixes).\n- drm/amdkfd: Reset GPU on queue preemption failure (stable-fixes).\n- drm/ast: Fix soft lockup (git-fixes).\n- drm/client: Fully protect modes[] with dev-\u003emode_config.mutex (stable-fixes).\n- drm/i915/cdclk: Fix CDCLK programming order when pipes are active (git-fixes).\n- drm/i915/vrr: Disable VRR when using bigjoiner (stable-fixes).\n- drm/i915: Disable port sync when bigjoiner is used (stable-fixes).\n- drm/msm/dp: fix typo in dp_display_handle_port_status_changed() (git-fixes).\n- drm/nouveau/nvkm: add a replacement for nvkm_notify (bsc#1223834)\n- drm/panel: ili9341: Respect deferred probe (git-fixes).\n- drm/panel: ili9341: Use predefined error codes (git-fixes).\n- drm/panel: visionox-rm69299: do not unregister DSI device (git-fixes).\n- drm/vc4: do not check if plane-\u003estate-\u003efb == state-\u003efb (stable-fixes).\n- drm/vmwgfx: Enable DMA mappings with SEV (git-fixes).\n- drm/vmwgfx: Fix crtc\u0027s atomic check conditional (git-fixes).\n- drm/vmwgfx: Fix invalid reads in fence signaled events (git-fixes).\n- drm/vmwgfx: Sort primary plane formats by order of preference (git-fixes).\n- drm: nv04: Fix out of bounds access (git-fixes).\n- drm: panel-orientation-quirks: Add quirk for GPD Win Mini (stable-fixes).\n- drm: panel-orientation-quirks: Add quirk for Lenovo Legion Go (stable-fixes).\n- dump_stack: Do not get cpu_sync for panic CPU (bsc#1223574).\n- fbdev: fix incorrect address computation in deferred IO (git-fixes).\n- fbdev: viafb: fix typo in hw_bitblt_1 and hw_bitblt_2 (stable-fixes).\n- fbmon: prevent division by zero in fb_videomode_from_videomode() (stable-fixes).\n- fix build warning\n- fuse: do not unhash root (bsc#1223951).\n- fuse: fix root lookup with nonzero generation (bsc#1223950).\n- hwmon: (amc6821) add of_match table (stable-fixes).\n- i2c: pxa: hide unused icr_bits[] variable (git-fixes).\n- i2c: smbus: fix NULL function pointer dereference (git-fixes).\n- i40e: Fix VF MAC filter removal (git-fixes).\n- idma64: Do not try to serve interrupts when device is powered off (git-fixes).\n- iio: accel: mxc4005: Interrupt handling fixes (git-fixes).\n- iio:imu: adis16475: Fix sync mode setting (git-fixes).\n- init/main.c: Fix potential static_command_line memory overflow (git-fixes).\n- iommu/amd: Add a length limitation for the ivrs_acpihid command-line parameter (git-fixes).\n- iommu/amd: Fix \u0027Guest Virtual APIC Table Root Pointer\u0027 configuration in IRTE (git-fixes).\n- iommu/amd: Fix domain flush size when syncing iotlb (git-fixes).\n- iommu/amd: Fix error handling for pdev_pri_ats_enable() (git-fixes).\n- iommu/arm-smmu-qcom: Limit the SMR groups to 128 (git-fixes).\n- iommu/arm-smmu-v3: Acknowledge pri/event queue overflow if any (git-fixes).\n- iommu/fsl: fix all kernel-doc warnings in fsl_pamu.c (git-fixes).\n- iommu/iova: Fix alloc iova overflows issue (git-fixes).\n- iommu/mediatek: Flush IOTLB completely only if domain has been attached (git-fixes).\n- iommu/rockchip: Fix unwind goto issue (git-fixes).\n- iommu/sprd: Release dma buffer to avoid memory leak (git-fixes).\n- iommu/vt-d: Allocate local memory for page request queue (git-fixes).\n- iommu/vt-d: Allow zero SAGAW if second-stage not supported (git-fixes).\n- iommu/vt-d: Fix error handling in sva enable/disable paths (git-fixes).\n- iommu: Fix error unwind in iommu_group_alloc() (git-fixes).\n- ipv6/addrconf: fix a potential refcount underflow for idev (git-fixes).\n- kABI: Adjust trace_iterator.wait_index (git-fixes).\n- kprobes: Fix double free of kretprobe_holder (bsc#1220901).\n- kprobes: Fix possible use-after-free issue on kprobe registration (git-fixes).\n- libnvdimm/of_pmem: Use devm_kstrdup instead of kstrdup and check its return value (git-fixes).\n- libnvdimm/region: Allow setting align attribute on regions without mappings (git-fixes).\n- livepatch: Fix missing newline character in klp_resolve_symbols() (bsc#1223539).\n- md/raid1: fix choose next idle in read_balance() (git-fixes).\n- md: Do not clear MD_CLOSING when the raid is about to stop (git-fixes).\n- md: do not clear MD_RECOVERY_FROZEN for new dm-raid until resume (git-fixes).\n- media: cec: core: remove length check of Timer Status (stable-fixes).\n- media: sta2x11: fix irq handler cast (stable-fixes).\n- mei: me: add arrow lake point H DID (stable-fixes).\n- mei: me: add arrow lake point S DID (stable-fixes).\n- mei: me: disable RPL-S on SPS and IGN firmwares (git-fixes).\n- mm/vmscan: make sure wakeup_kswapd with managed zone (bsc#1223473).\n- mmc: sdhci-msm: pervent access to suspended controller (git-fixes).\n- mtd: diskonchip: work around ubsan link failure (stable-fixes).\n- nd_btt: Make BTT lanes preemptible (git-fixes).\n- net: bridge: vlan: fix memory leak in __allowed_ingress (git-fixes).\n- net: fix a memleak when uncloning an skb dst and its metadata (git-fixes).\n- net: fix skb leak in __skb_tstamp_tx() (git-fixes).\n- net: ipv6: ensure we call ipv6_mc_down() at most once (git-fixes).\n- net: mld: fix reference count leak in mld_{query | report}_work() (git-fixes).\n- net: stream: purge sk_error_queue in sk_stream_kill_queues() (git-fixes).\n- net: usb: ax88179_178a: avoid the interface always configured as random address (git-fixes).\n- net: usb: ax88179_178a: avoid writing the mac address before first reading (git-fixes).\n- net: usb: ax88179_178a: stop lying about skb-\u003etruesize (git-fixes).\n- net: vlan: fix underflow for the real_dev refcnt (git-fixes).\n- netfilter: br_netfilter: Drop dst references before setting (git-fixes).\n- netfilter: ipt_CLUSTERIP: fix refcount leak in clusterip_tg_check() (git-fixes).\n- netfilter: nft_ct: fix l3num expectations with inet pseudo family (git-fixes).\n- nfsd: use __fput_sync() to avoid delayed closing of files (bsc#1223380 bsc#1217408).\n- nilfs2: fix OOB in nilfs_set_de_type (git-fixes).\n- nilfs2: fix OOB in nilfs_set_de_type (git-fixes).\n- nouveau: fix function cast warning (git-fixes).\n- nouveau: fix instmem race condition around ptr stores (git-fixes).\n- nvdimm/namespace: drop nested variable in create_namespace_pmem() (git-fixes).\n- nvdimm: Allow overwrite in the presence of disabled dimms (git-fixes).\n- nvdimm: Fix badblocks clear off-by-one error (git-fixes).\n- nvdimm: Fix dereference after free in register_nvdimm_pmu() (git-fixes).\n- nvdimm: Fix firmware activation deadlock scenarios (git-fixes).\n- nvdimm: Fix memleak of pmu attr_groups in unregister_nvdimm_pmu() (git-fixes).\n- pci_iounmap(): Fix MMIO mapping leak (git-fixes).\n- phy: tegra: xusb: Add API to retrieve the port number of phy (stable-fixes).\n- pinctrl: renesas: checker: Limit cfg reg enum checks to provided IDs (stable-fixes).\n- platform/x86: touchscreen_dmi: Add an extra entry for a variant of the Chuwi Vi8 tablet (stable-fixes).\n- powerpc/kasan: Do not instrument non-maskable or raw interrupts (bsc#1223191).\n- powerpc/pseries/iommu: LPAR panics when rebooted with a frozen PE (bsc#1222011 ltc#205900).\n- powerpc/rtas: define pr_fmt and convert printk call sites (bsc#1223369 ltc#205888).\n- powerpc/rtas: export rtas_error_rc() for reuse (bsc#1223369 ltc#205888).\n- powerpc: Avoid nmi_enter/nmi_exit in real mode interrupt (bsc#1221645 ltc#205739 bsc#1223191).\n- powerpc: Refactor verification of MSR_RI (bsc#1223191).\n- printk: Add this_cpu_in_panic() (bsc#1223574).\n- printk: Adjust mapping for 32bit seq macros (bsc#1223574).\n- printk: Avoid non-panic CPUs writing to ringbuffer (bsc#1223574).\n- printk: Disable passing console lock owner completely during panic() (bsc#1223574).\n- printk: Drop console_sem during panic (bsc#1223574).\n- printk: Rename abandon_console_lock_in_panic() to other_cpu_in_panic() (bsc#1223574).\n- printk: Use prb_first_seq() as base for 32bit seq macros (bsc#1223574).\n- printk: Wait for all reserved records with pr_flush() (bsc#1223574).\n- printk: nbcon: Relocate 32bit seq macros (bsc#1223574).\n- printk: ringbuffer: Clarify special lpos values (bsc#1223574).\n- printk: ringbuffer: Cleanup reader terminology (bsc#1223574).\n- printk: ringbuffer: Do not skip non-finalized records with prb_next_seq() (bsc#1223574).\n- printk: ringbuffer: Improve prb_next_seq() performance (bsc#1223574).\n- printk: ringbuffer: Skip non-finalized records in panic (bsc#1223574).\n- pstore/zone: Add a null pointer check to the psz_kmsg_read (stable-fixes).\n- ring-buffer: Do not set shortest_full when full target is hit (git-fixes).\n- ring-buffer: Fix full_waiters_pending in poll (git-fixes).\n- ring-buffer: Fix resetting of shortest_full (git-fixes).\n- ring-buffer: Fix waking up ring buffer readers (git-fixes).\n- ring-buffer: Make wake once of ring_buffer_wait() more robust (git-fixes).\n- ring-buffer: Use wait_event_interruptible() in ring_buffer_wait() (git-fixes).\n- ring-buffer: use READ_ONCE() to read cpu_buffer-\u003ecommit_page in concurrent environment (git-fixes).\n- s390/cio: Ensure the copied buf is NUL terminated (git-fixes bsc#1223875).\n- s390/decompressor: fix misaligned symbol build error (git-fixes bsc#1223785).\n- s390/mm: Fix clearing storage keys for huge pages (git-fixes bsc#1223877).\n- s390/mm: Fix storage key clearing for guest huge pages (git-fixes bsc#1223878).\n- s390/qeth: Fix kernel panic after setting hsuid (git-fixes bsc#1223879).\n- s390/scm: fix virtual vs physical address confusion (git-fixes bsc#1223784).\n- s390/vdso: Add CFI for RA register to asm macro vdso_func (git-fixes bsc#1223876).\n- s390/vdso: drop \u0027-fPIC\u0027 from LDFLAGS (git-fixes bsc#1223598).\n- s390/zcrypt: fix reference counting on zcrypt card objects (git-fixes bsc#1223595).\n- serial/pmac_zilog: Remove flawed mitigation for rx irq flood (git-fixes).\n- serial: core: Provide port lock wrappers (stable-fixes).\n- serial: core: fix kernel-doc for uart_port_unlock_irqrestore() (git-fixes).\n- serial: mxs-auart: add spinlock around changing cts state (git-fixes).\n- slimbus: qcom-ngd-ctrl: Add timeout for wait operation (git-fixes).\n- speakup: Avoid crash on very long word (git-fixes).\n- speakup: Fix 8bit characters from direct synth (git-fixes).\n- tcp/udp: Fix memleaks of sk and zerocopy skbs with TX timestamp (git-fixes).\n- thunderbolt: Avoid notify PM core about runtime PM resume (stable-fixes).\n- thunderbolt: Fix wake configurations after device unplug (stable-fixes).\n- tracing/net_sched: Fix tracepoints that save qdisc_dev() as a string (git-fixes).\n- tracing/ring-buffer: Fix wait_on_pipe() race (git-fixes).\n- tracing: Have saved_cmdlines arrays all in one allocation (git-fixes).\n- tracing: Remove precision vsnprintf() check from print event (git-fixes).\n- tracing: Show size of requested perf buffer (git-fixes).\n- tracing: Use .flush() call to wake up readers (git-fixes).\n- usb: Disable USB3 LPM at shutdown (stable-fixes).\n- usb: Fix regression caused by invalid ep0 maxpacket in virtual SuperSpeed device (git-fixes).\n- usb: dwc2: host: Fix dereference issue in DDMA completion flow (git-fixes).\n- usb: gadget: composite: fix OS descriptors w_value logic (git-fixes).\n- usb: gadget: f_fs: Fix a race condition when processing setup packets (git-fixes).\n- usb: gadget: f_ncm: Fix UAF ncm object at re-bind after usb ep transport error (stable-fixes).\n- usb: gadget: tegra-xudc: Fix USB3 PHY retrieval logic (git-fixes).\n- usb: ohci: Prevent missed ohci interrupts (git-fixes).\n- usb: sl811-hcd: only defined function checkdone if QUIRK2 is defined (stable-fixes).\n- usb: typec: tcpci: add generic tcpci fallback compatible (stable-fixes).\n- usb: typec: tcpm: Check for port partner validity before consuming it (git-fixes).\n- usb: typec: tcpm: unregister existing source caps before re-registration (bsc#1220569).\n- usb: typec: ucsi: Ack unsupported commands (stable-fixes).\n- usb: typec: ucsi: Clear UCSI_CCI_RESET_COMPLETE before reset (stable-fixes).\n- usb: typec: ucsi: Fix connector check on init (git-fixes).\n- usb: udc: remove warning when queue disabled ep (stable-fixes).\n- vdpa/mlx5: Allow CVQ size changes (git-fixes).\n- virtio: treat alloc_dax() -EOPNOTSUPP failure as non-fatal (bsc#1223949).\n- wifi: ath9k: fix LNA selection in ath_ant_try_scan() (stable-fixes).\n- wifi: iwlwifi: mvm: remove old PASN station when adding a new one (git-fixes).\n- wifi: iwlwifi: mvm: return uid from iwl_mvm_build_scan_cmd (git-fixes).\n- wifi: mac80211: check/clear fast rx for non-4addr sta VLAN changes (stable-fixes).\n- wifi: nl80211: do not free NULL coalescing rule (git-fixes).\n- x86/cpufeatures: Fix dependencies for GFNI, VAES, and VPCLMULQDQ (git-fixes).\n- x86/mm: Ensure input to pfn_to_kaddr() is treated as a 64-bit type (jsc#PED-7167 git-fixes).\n- x86/sev: Skip ROM range scans and validation for SEV-SNP guests (jsc#PED-7167 git-fixes).\n- x86/xen: Add some null pointer checking to smp.c (git-fixes).\n- x86/xen: add CPU dependencies for 32-bit build (git-fixes).\n- x86/xen: fix percpu vcpu_info allocation (git-fixes).\n- xen-netback: properly sync TX responses (git-fixes).\n- xen-netfront: Add missing skb_mark_for_recycle (git-fixes).\n- xen/gntdev: Fix the abuse of underlying struct page in DMA-buf import (git-fixes).\n- xen/xenbus: document will_handle argument for xenbus_watch_path() (git-fixes).\n- xfrm6: fix inet6_dev refcount underflow problem (git-fixes).\n",
        "title": "Description of the patch"
      },
      {
        "category": "details",
        "text": "SUSE-2024-1659,SUSE-SLE-Micro-5.5-2024-1659,SUSE-SLE-Module-Basesystem-15-SP5-2024-1659,SUSE-SLE-Module-Development-Tools-15-SP5-2024-1659,SUSE-SLE-Module-Legacy-15-SP5-2024-1659,SUSE-SLE-Module-Live-Patching-15-SP5-2024-1659,SUSE-SLE-Product-HA-15-SP5-2024-1659,SUSE-SLE-Product-WE-15-SP5-2024-1659,openSUSE-SLE-15.5-2024-1659",
        "title": "Patchnames"
      },
      {
        "category": "legal_disclaimer",
        "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
        "title": "Terms of use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://www.suse.com/support/security/contact/",
      "name": "SUSE Product Security Team",
      "namespace": "https://www.suse.com/"
    },
    "references": [
      {
        "category": "external",
        "summary": "SUSE ratings",
        "url": "https://www.suse.com/support/security/rating/"
      },
      {
        "category": "self",
        "summary": "URL of this CSAF notice",
        "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2024_1659-1.json"
      },
      {
        "category": "self",
        "summary": "URL for SUSE-SU-2024:1659-1",
        "url": "https://www.suse.com/support/update/announcement/2024/suse-su-20241659-1/"
      },
      {
        "category": "self",
        "summary": "E-Mail link for SUSE-SU-2024:1659-1",
        "url": "https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1177529",
        "url": "https://bugzilla.suse.com/1177529"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1192145",
        "url": "https://bugzilla.suse.com/1192145"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1211592",
        "url": "https://bugzilla.suse.com/1211592"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1217408",
        "url": "https://bugzilla.suse.com/1217408"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1218562",
        "url": "https://bugzilla.suse.com/1218562"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1218917",
        "url": "https://bugzilla.suse.com/1218917"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1219104",
        "url": "https://bugzilla.suse.com/1219104"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1219126",
        "url": "https://bugzilla.suse.com/1219126"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1219169",
        "url": "https://bugzilla.suse.com/1219169"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1219170",
        "url": "https://bugzilla.suse.com/1219170"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1219264",
        "url": "https://bugzilla.suse.com/1219264"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1220342",
        "url": "https://bugzilla.suse.com/1220342"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1220569",
        "url": "https://bugzilla.suse.com/1220569"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1220761",
        "url": "https://bugzilla.suse.com/1220761"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1220901",
        "url": "https://bugzilla.suse.com/1220901"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1220915",
        "url": "https://bugzilla.suse.com/1220915"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1220935",
        "url": "https://bugzilla.suse.com/1220935"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1221042",
        "url": "https://bugzilla.suse.com/1221042"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1221044",
        "url": "https://bugzilla.suse.com/1221044"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1221080",
        "url": "https://bugzilla.suse.com/1221080"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1221084",
        "url": "https://bugzilla.suse.com/1221084"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1221088",
        "url": "https://bugzilla.suse.com/1221088"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1221162",
        "url": "https://bugzilla.suse.com/1221162"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1221299",
        "url": "https://bugzilla.suse.com/1221299"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1221612",
        "url": "https://bugzilla.suse.com/1221612"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1221617",
        "url": "https://bugzilla.suse.com/1221617"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1221645",
        "url": "https://bugzilla.suse.com/1221645"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1221791",
        "url": "https://bugzilla.suse.com/1221791"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1221825",
        "url": "https://bugzilla.suse.com/1221825"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222011",
        "url": "https://bugzilla.suse.com/1222011"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222051",
        "url": "https://bugzilla.suse.com/1222051"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222247",
        "url": "https://bugzilla.suse.com/1222247"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222266",
        "url": "https://bugzilla.suse.com/1222266"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222294",
        "url": "https://bugzilla.suse.com/1222294"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222307",
        "url": "https://bugzilla.suse.com/1222307"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222357",
        "url": "https://bugzilla.suse.com/1222357"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222368",
        "url": "https://bugzilla.suse.com/1222368"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222379",
        "url": "https://bugzilla.suse.com/1222379"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222416",
        "url": "https://bugzilla.suse.com/1222416"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222422",
        "url": "https://bugzilla.suse.com/1222422"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222424",
        "url": "https://bugzilla.suse.com/1222424"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222427",
        "url": "https://bugzilla.suse.com/1222427"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222428",
        "url": "https://bugzilla.suse.com/1222428"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222430",
        "url": "https://bugzilla.suse.com/1222430"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222431",
        "url": "https://bugzilla.suse.com/1222431"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222435",
        "url": "https://bugzilla.suse.com/1222435"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222437",
        "url": "https://bugzilla.suse.com/1222437"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222445",
        "url": "https://bugzilla.suse.com/1222445"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222449",
        "url": "https://bugzilla.suse.com/1222449"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222482",
        "url": "https://bugzilla.suse.com/1222482"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222503",
        "url": "https://bugzilla.suse.com/1222503"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222520",
        "url": "https://bugzilla.suse.com/1222520"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222536",
        "url": "https://bugzilla.suse.com/1222536"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222549",
        "url": "https://bugzilla.suse.com/1222549"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222550",
        "url": "https://bugzilla.suse.com/1222550"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222557",
        "url": "https://bugzilla.suse.com/1222557"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222559",
        "url": "https://bugzilla.suse.com/1222559"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222585",
        "url": "https://bugzilla.suse.com/1222585"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222586",
        "url": "https://bugzilla.suse.com/1222586"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222596",
        "url": "https://bugzilla.suse.com/1222596"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222609",
        "url": "https://bugzilla.suse.com/1222609"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222610",
        "url": "https://bugzilla.suse.com/1222610"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222613",
        "url": "https://bugzilla.suse.com/1222613"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222615",
        "url": "https://bugzilla.suse.com/1222615"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222618",
        "url": "https://bugzilla.suse.com/1222618"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222624",
        "url": "https://bugzilla.suse.com/1222624"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222630",
        "url": "https://bugzilla.suse.com/1222630"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222632",
        "url": "https://bugzilla.suse.com/1222632"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222660",
        "url": "https://bugzilla.suse.com/1222660"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222662",
        "url": "https://bugzilla.suse.com/1222662"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222664",
        "url": "https://bugzilla.suse.com/1222664"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222666",
        "url": "https://bugzilla.suse.com/1222666"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222669",
        "url": "https://bugzilla.suse.com/1222669"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222671",
        "url": "https://bugzilla.suse.com/1222671"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222677",
        "url": "https://bugzilla.suse.com/1222677"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222678",
        "url": "https://bugzilla.suse.com/1222678"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222680",
        "url": "https://bugzilla.suse.com/1222680"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222703",
        "url": "https://bugzilla.suse.com/1222703"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222704",
        "url": "https://bugzilla.suse.com/1222704"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222706",
        "url": "https://bugzilla.suse.com/1222706"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222709",
        "url": "https://bugzilla.suse.com/1222709"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222710",
        "url": "https://bugzilla.suse.com/1222710"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222720",
        "url": "https://bugzilla.suse.com/1222720"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222721",
        "url": "https://bugzilla.suse.com/1222721"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222724",
        "url": "https://bugzilla.suse.com/1222724"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222726",
        "url": "https://bugzilla.suse.com/1222726"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222727",
        "url": "https://bugzilla.suse.com/1222727"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222764",
        "url": "https://bugzilla.suse.com/1222764"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222772",
        "url": "https://bugzilla.suse.com/1222772"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222773",
        "url": "https://bugzilla.suse.com/1222773"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222776",
        "url": "https://bugzilla.suse.com/1222776"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222781",
        "url": "https://bugzilla.suse.com/1222781"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222784",
        "url": "https://bugzilla.suse.com/1222784"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222785",
        "url": "https://bugzilla.suse.com/1222785"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222787",
        "url": "https://bugzilla.suse.com/1222787"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222790",
        "url": "https://bugzilla.suse.com/1222790"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222791",
        "url": "https://bugzilla.suse.com/1222791"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222792",
        "url": "https://bugzilla.suse.com/1222792"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222796",
        "url": "https://bugzilla.suse.com/1222796"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222798",
        "url": "https://bugzilla.suse.com/1222798"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222801",
        "url": "https://bugzilla.suse.com/1222801"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222812",
        "url": "https://bugzilla.suse.com/1222812"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222824",
        "url": "https://bugzilla.suse.com/1222824"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222829",
        "url": "https://bugzilla.suse.com/1222829"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222832",
        "url": "https://bugzilla.suse.com/1222832"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222836",
        "url": "https://bugzilla.suse.com/1222836"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222838",
        "url": "https://bugzilla.suse.com/1222838"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222866",
        "url": "https://bugzilla.suse.com/1222866"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222867",
        "url": "https://bugzilla.suse.com/1222867"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222869",
        "url": "https://bugzilla.suse.com/1222869"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222876",
        "url": "https://bugzilla.suse.com/1222876"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222878",
        "url": "https://bugzilla.suse.com/1222878"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222879",
        "url": "https://bugzilla.suse.com/1222879"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222881",
        "url": "https://bugzilla.suse.com/1222881"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222883",
        "url": "https://bugzilla.suse.com/1222883"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222888",
        "url": "https://bugzilla.suse.com/1222888"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222894",
        "url": "https://bugzilla.suse.com/1222894"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222901",
        "url": "https://bugzilla.suse.com/1222901"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222968",
        "url": "https://bugzilla.suse.com/1222968"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223012",
        "url": "https://bugzilla.suse.com/1223012"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223014",
        "url": "https://bugzilla.suse.com/1223014"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223016",
        "url": "https://bugzilla.suse.com/1223016"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223024",
        "url": "https://bugzilla.suse.com/1223024"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223030",
        "url": "https://bugzilla.suse.com/1223030"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223033",
        "url": "https://bugzilla.suse.com/1223033"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223034",
        "url": "https://bugzilla.suse.com/1223034"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223035",
        "url": "https://bugzilla.suse.com/1223035"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223036",
        "url": "https://bugzilla.suse.com/1223036"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223037",
        "url": "https://bugzilla.suse.com/1223037"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223041",
        "url": "https://bugzilla.suse.com/1223041"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223042",
        "url": "https://bugzilla.suse.com/1223042"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223051",
        "url": "https://bugzilla.suse.com/1223051"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223052",
        "url": "https://bugzilla.suse.com/1223052"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223056",
        "url": "https://bugzilla.suse.com/1223056"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223057",
        "url": "https://bugzilla.suse.com/1223057"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223058",
        "url": "https://bugzilla.suse.com/1223058"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223060",
        "url": "https://bugzilla.suse.com/1223060"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223061",
        "url": "https://bugzilla.suse.com/1223061"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223065",
        "url": "https://bugzilla.suse.com/1223065"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223066",
        "url": "https://bugzilla.suse.com/1223066"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223067",
        "url": "https://bugzilla.suse.com/1223067"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223068",
        "url": "https://bugzilla.suse.com/1223068"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223076",
        "url": "https://bugzilla.suse.com/1223076"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223078",
        "url": "https://bugzilla.suse.com/1223078"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223111",
        "url": "https://bugzilla.suse.com/1223111"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223115",
        "url": "https://bugzilla.suse.com/1223115"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223118",
        "url": "https://bugzilla.suse.com/1223118"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223187",
        "url": "https://bugzilla.suse.com/1223187"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223189",
        "url": "https://bugzilla.suse.com/1223189"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223190",
        "url": "https://bugzilla.suse.com/1223190"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223191",
        "url": "https://bugzilla.suse.com/1223191"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223196",
        "url": "https://bugzilla.suse.com/1223196"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223197",
        "url": "https://bugzilla.suse.com/1223197"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223198",
        "url": "https://bugzilla.suse.com/1223198"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223275",
        "url": "https://bugzilla.suse.com/1223275"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223323",
        "url": "https://bugzilla.suse.com/1223323"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223369",
        "url": "https://bugzilla.suse.com/1223369"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223380",
        "url": "https://bugzilla.suse.com/1223380"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223473",
        "url": "https://bugzilla.suse.com/1223473"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223474",
        "url": "https://bugzilla.suse.com/1223474"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223475",
        "url": "https://bugzilla.suse.com/1223475"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223477",
        "url": "https://bugzilla.suse.com/1223477"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223478",
        "url": "https://bugzilla.suse.com/1223478"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223479",
        "url": "https://bugzilla.suse.com/1223479"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223481",
        "url": "https://bugzilla.suse.com/1223481"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223482",
        "url": "https://bugzilla.suse.com/1223482"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223484",
        "url": "https://bugzilla.suse.com/1223484"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223487",
        "url": "https://bugzilla.suse.com/1223487"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223490",
        "url": "https://bugzilla.suse.com/1223490"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223496",
        "url": "https://bugzilla.suse.com/1223496"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223498",
        "url": "https://bugzilla.suse.com/1223498"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223499",
        "url": "https://bugzilla.suse.com/1223499"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223501",
        "url": "https://bugzilla.suse.com/1223501"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223502",
        "url": "https://bugzilla.suse.com/1223502"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223503",
        "url": "https://bugzilla.suse.com/1223503"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223505",
        "url": "https://bugzilla.suse.com/1223505"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223509",
        "url": "https://bugzilla.suse.com/1223509"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223511",
        "url": "https://bugzilla.suse.com/1223511"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223512",
        "url": "https://bugzilla.suse.com/1223512"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223513",
        "url": "https://bugzilla.suse.com/1223513"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223516",
        "url": "https://bugzilla.suse.com/1223516"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223517",
        "url": "https://bugzilla.suse.com/1223517"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223518",
        "url": "https://bugzilla.suse.com/1223518"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223519",
        "url": "https://bugzilla.suse.com/1223519"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223520",
        "url": "https://bugzilla.suse.com/1223520"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223522",
        "url": "https://bugzilla.suse.com/1223522"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223523",
        "url": "https://bugzilla.suse.com/1223523"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223525",
        "url": "https://bugzilla.suse.com/1223525"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223539",
        "url": "https://bugzilla.suse.com/1223539"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223574",
        "url": "https://bugzilla.suse.com/1223574"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223595",
        "url": "https://bugzilla.suse.com/1223595"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223598",
        "url": "https://bugzilla.suse.com/1223598"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223634",
        "url": "https://bugzilla.suse.com/1223634"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223643",
        "url": "https://bugzilla.suse.com/1223643"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223644",
        "url": "https://bugzilla.suse.com/1223644"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223645",
        "url": "https://bugzilla.suse.com/1223645"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223646",
        "url": "https://bugzilla.suse.com/1223646"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223648",
        "url": "https://bugzilla.suse.com/1223648"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223655",
        "url": "https://bugzilla.suse.com/1223655"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223657",
        "url": "https://bugzilla.suse.com/1223657"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223660",
        "url": "https://bugzilla.suse.com/1223660"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223661",
        "url": "https://bugzilla.suse.com/1223661"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223663",
        "url": "https://bugzilla.suse.com/1223663"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223664",
        "url": "https://bugzilla.suse.com/1223664"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223668",
        "url": "https://bugzilla.suse.com/1223668"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223686",
        "url": "https://bugzilla.suse.com/1223686"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223693",
        "url": "https://bugzilla.suse.com/1223693"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223705",
        "url": "https://bugzilla.suse.com/1223705"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223714",
        "url": "https://bugzilla.suse.com/1223714"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223735",
        "url": "https://bugzilla.suse.com/1223735"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223745",
        "url": "https://bugzilla.suse.com/1223745"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223784",
        "url": "https://bugzilla.suse.com/1223784"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223785",
        "url": "https://bugzilla.suse.com/1223785"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223790",
        "url": "https://bugzilla.suse.com/1223790"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223816",
        "url": "https://bugzilla.suse.com/1223816"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223821",
        "url": "https://bugzilla.suse.com/1223821"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223822",
        "url": "https://bugzilla.suse.com/1223822"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223824",
        "url": "https://bugzilla.suse.com/1223824"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223827",
        "url": "https://bugzilla.suse.com/1223827"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223834",
        "url": "https://bugzilla.suse.com/1223834"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223875",
        "url": "https://bugzilla.suse.com/1223875"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223876",
        "url": "https://bugzilla.suse.com/1223876"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223877",
        "url": "https://bugzilla.suse.com/1223877"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223878",
        "url": "https://bugzilla.suse.com/1223878"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223879",
        "url": "https://bugzilla.suse.com/1223879"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223894",
        "url": "https://bugzilla.suse.com/1223894"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223921",
        "url": "https://bugzilla.suse.com/1223921"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223922",
        "url": "https://bugzilla.suse.com/1223922"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223923",
        "url": "https://bugzilla.suse.com/1223923"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223924",
        "url": "https://bugzilla.suse.com/1223924"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223929",
        "url": "https://bugzilla.suse.com/1223929"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223931",
        "url": "https://bugzilla.suse.com/1223931"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223932",
        "url": "https://bugzilla.suse.com/1223932"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223934",
        "url": "https://bugzilla.suse.com/1223934"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223941",
        "url": "https://bugzilla.suse.com/1223941"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223948",
        "url": "https://bugzilla.suse.com/1223948"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223949",
        "url": "https://bugzilla.suse.com/1223949"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223950",
        "url": "https://bugzilla.suse.com/1223950"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223951",
        "url": "https://bugzilla.suse.com/1223951"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223952",
        "url": "https://bugzilla.suse.com/1223952"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223953",
        "url": "https://bugzilla.suse.com/1223953"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223956",
        "url": "https://bugzilla.suse.com/1223956"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223957",
        "url": "https://bugzilla.suse.com/1223957"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223960",
        "url": "https://bugzilla.suse.com/1223960"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223962",
        "url": "https://bugzilla.suse.com/1223962"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223963",
        "url": "https://bugzilla.suse.com/1223963"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223964",
        "url": "https://bugzilla.suse.com/1223964"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47047 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47047/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47181 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47181/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47182 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47182/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47183 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47183/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47184 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47184/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47185 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47185/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47187 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47187/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47188 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47188/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47189 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47189/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47191 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47191/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47192 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47192/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47193 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47193/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47194 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47194/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47195 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47195/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47196 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47196/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47197 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47197/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47198 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47198/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47199 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47199/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47200 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47200/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47201 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47201/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47202 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47202/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47203 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47203/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47204 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47204/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47205 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47205/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47206 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47206/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47207 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47207/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47209 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47209/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47210 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47210/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47211 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47211/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47212 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47212/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47214 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47214/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47215 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47215/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47216 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47216/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47217 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47217/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47218 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47218/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47219 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47219/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-48631 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-48631/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-48632 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-48632/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-48634 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-48634/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-48636 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-48636/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-48637 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-48637/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-48638 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-48638/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-48639 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-48639/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-48640 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-48640/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-48642 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-48642/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-48644 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-48644/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-48646 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-48646/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-48647 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-48647/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-48648 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-48648/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-48650 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-48650/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-48651 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-48651/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-48652 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-48652/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-48653 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-48653/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-48654 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-48654/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-48655 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-48655/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-48656 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-48656/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-48657 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-48657/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-48658 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-48658/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-48659 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-48659/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-48660 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-48660/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-48662 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-48662/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-48663 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-48663/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-48667 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-48667/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-48668 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-48668/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-48671 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-48671/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-48672 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-48672/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-48673 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-48673/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-48675 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-48675/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-48686 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-48686/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-48687 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-48687/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-48688 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-48688/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-48690 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-48690/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-48692 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-48692/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-48693 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-48693/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-48694 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-48694/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-48695 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-48695/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-48697 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-48697/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-48698 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-48698/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-48700 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-48700/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-48701 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-48701/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-48702 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-48702/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-48703 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-48703/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-48704 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-48704/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-2860 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-2860/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-52488 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-52488/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-52503 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-52503/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-52561 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-52561/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-52585 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-52585/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-52589 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-52589/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-52590 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-52590/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-52591 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-52591/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-52593 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-52593/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-52614 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-52614/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-52616 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-52616/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-52620 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-52620/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-52627 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-52627/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-52635 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-52635/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-52636 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-52636/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-52645 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-52645/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-52652 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-52652/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-6270 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-6270/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-0639 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-0639/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-0841 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-0841/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-22099 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-22099/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-23307 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-23307/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-23848 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-23848/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-23850 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-23850/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26601 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26601/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26610 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26610/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26656 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26656/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26660 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26660/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26671 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26671/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26673 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26673/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26675 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26675/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26680 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26680/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26681 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26681/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26684 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26684/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26685 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26685/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26687 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26687/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26688 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26688/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26689 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26689/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26696 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26696/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26697 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26697/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26702 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26702/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26704 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26704/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26718 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26718/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26722 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26722/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26727 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26727/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26733 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26733/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26736 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26736/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26737 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26737/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26739 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26739/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26743 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26743/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26744 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26744/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26745 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26745/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26747 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26747/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26749 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26749/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26751 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26751/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26754 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26754/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26760 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26760/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26763 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26763/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26764 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26764/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26766 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26766/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26769 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26769/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26771 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26771/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26772 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26772/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26773 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26773/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26776 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26776/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26779 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26779/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26783 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26783/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26787 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26787/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26790 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26790/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26792 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26792/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26793 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26793/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26798 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26798/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26805 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26805/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26807 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26807/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26816 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26816/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26817 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26817/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26820 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26820/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26825 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26825/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26830 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26830/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26833 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26833/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26836 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26836/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26843 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26843/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26848 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26848/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26852 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26852/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26853 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26853/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26855 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26855/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26856 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26856/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26857 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26857/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26861 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26861/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26862 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26862/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26866 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26866/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26872 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26872/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26875 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26875/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26878 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26878/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26879 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26879/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26881 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26881/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26882 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26882/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26883 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26883/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26884 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26884/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26885 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26885/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26891 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26891/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26893 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26893/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26895 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26895/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26896 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26896/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26897 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26897/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26898 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26898/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26901 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26901/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26903 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26903/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26917 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26917/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26927 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26927/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26948 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26948/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26950 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26950/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26951 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26951/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26955 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26955/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26956 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26956/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26960 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26960/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26965 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26965/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26966 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26966/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26969 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26969/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26970 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26970/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26972 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26972/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26981 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26981/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26982 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26982/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26993 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26993/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-27013 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-27013/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-27014 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-27014/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-27030 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-27030/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-27038 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-27038/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-27039 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-27039/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-27041 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-27041/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-27043 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-27043/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-27046 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-27046/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-27056 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-27056/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-27062 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-27062/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-27389 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-27389/"
      }
    ],
    "title": "Security update for the Linux Kernel",
    "tracking": {
      "current_release_date": "2024-05-15T09:29:37Z",
      "generator": {
        "date": "2024-05-15T09:29:37Z",
        "engine": {
          "name": "cve-database.git:bin/generate-csaf.pl",
          "version": "1"
        }
      },
      "id": "SUSE-SU-2024:1659-1",
      "initial_release_date": "2024-05-15T09:29:37Z",
      "revision_history": [
        {
          "date": "2024-05-15T09:29:37Z",
          "number": "1",
          "summary": "Current version"
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
                "product": {
                  "name": "cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
                  "product_id": "cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
                "product": {
                  "name": "cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
                  "product_id": "cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
                "product": {
                  "name": "dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
                  "product_id": "dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
                "product": {
                  "name": "dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
                  "product_id": "dlm-kmp-default-5.14.21-150500.55.62.2.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
                "product": {
                  "name": "dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
                  "product_id": "dtb-allwinner-5.14.21-150500.55.62.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "dtb-altera-5.14.21-150500.55.62.1.aarch64",
                "product": {
                  "name": "dtb-altera-5.14.21-150500.55.62.1.aarch64",
                  "product_id": "dtb-altera-5.14.21-150500.55.62.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "dtb-amazon-5.14.21-150500.55.62.1.aarch64",
                "product": {
                  "name": "dtb-amazon-5.14.21-150500.55.62.1.aarch64",
                  "product_id": "dtb-amazon-5.14.21-150500.55.62.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "dtb-amd-5.14.21-150500.55.62.1.aarch64",
                "product": {
                  "name": "dtb-amd-5.14.21-150500.55.62.1.aarch64",
                  "product_id": "dtb-amd-5.14.21-150500.55.62.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
                "product": {
                  "name": "dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
                  "product_id": "dtb-amlogic-5.14.21-150500.55.62.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "dtb-apm-5.14.21-150500.55.62.1.aarch64",
                "product": {
                  "name": "dtb-apm-5.14.21-150500.55.62.1.aarch64",
                  "product_id": "dtb-apm-5.14.21-150500.55.62.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "dtb-apple-5.14.21-150500.55.62.1.aarch64",
                "product": {
                  "name": "dtb-apple-5.14.21-150500.55.62.1.aarch64",
                  "product_id": "dtb-apple-5.14.21-150500.55.62.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "dtb-arm-5.14.21-150500.55.62.1.aarch64",
                "product": {
                  "name": "dtb-arm-5.14.21-150500.55.62.1.aarch64",
                  "product_id": "dtb-arm-5.14.21-150500.55.62.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
                "product": {
                  "name": "dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
                  "product_id": "dtb-broadcom-5.14.21-150500.55.62.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "dtb-cavium-5.14.21-150500.55.62.1.aarch64",
                "product": {
                  "name": "dtb-cavium-5.14.21-150500.55.62.1.aarch64",
                  "product_id": "dtb-cavium-5.14.21-150500.55.62.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "dtb-exynos-5.14.21-150500.55.62.1.aarch64",
                "product": {
                  "name": "dtb-exynos-5.14.21-150500.55.62.1.aarch64",
                  "product_id": "dtb-exynos-5.14.21-150500.55.62.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "dtb-freescale-5.14.21-150500.55.62.1.aarch64",
                "product": {
                  "name": "dtb-freescale-5.14.21-150500.55.62.1.aarch64",
                  "product_id": "dtb-freescale-5.14.21-150500.55.62.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
                "product": {
                  "name": "dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
                  "product_id": "dtb-hisilicon-5.14.21-150500.55.62.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "dtb-lg-5.14.21-150500.55.62.1.aarch64",
                "product": {
                  "name": "dtb-lg-5.14.21-150500.55.62.1.aarch64",
                  "product_id": "dtb-lg-5.14.21-150500.55.62.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "dtb-marvell-5.14.21-150500.55.62.1.aarch64",
                "product": {
                  "name": "dtb-marvell-5.14.21-150500.55.62.1.aarch64",
                  "product_id": "dtb-marvell-5.14.21-150500.55.62.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
                "product": {
                  "name": "dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
                  "product_id": "dtb-mediatek-5.14.21-150500.55.62.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
                "product": {
                  "name": "dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
                  "product_id": "dtb-nvidia-5.14.21-150500.55.62.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "dtb-qcom-5.14.21-150500.55.62.1.aarch64",
                "product": {
                  "name": "dtb-qcom-5.14.21-150500.55.62.1.aarch64",
                  "product_id": "dtb-qcom-5.14.21-150500.55.62.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "dtb-renesas-5.14.21-150500.55.62.1.aarch64",
                "product": {
                  "name": "dtb-renesas-5.14.21-150500.55.62.1.aarch64",
                  "product_id": "dtb-renesas-5.14.21-150500.55.62.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
                "product": {
                  "name": "dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
                  "product_id": "dtb-rockchip-5.14.21-150500.55.62.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "dtb-socionext-5.14.21-150500.55.62.1.aarch64",
                "product": {
                  "name": "dtb-socionext-5.14.21-150500.55.62.1.aarch64",
                  "product_id": "dtb-socionext-5.14.21-150500.55.62.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "dtb-sprd-5.14.21-150500.55.62.1.aarch64",
                "product": {
                  "name": "dtb-sprd-5.14.21-150500.55.62.1.aarch64",
                  "product_id": "dtb-sprd-5.14.21-150500.55.62.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
                "product": {
                  "name": "dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
                  "product_id": "dtb-xilinx-5.14.21-150500.55.62.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
                "product": {
                  "name": "gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
                  "product_id": "gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
                "product": {
                  "name": "gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
                  "product_id": "gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-64kb-5.14.21-150500.55.62.2.aarch64",
                "product": {
                  "name": "kernel-64kb-5.14.21-150500.55.62.2.aarch64",
                  "product_id": "kernel-64kb-5.14.21-150500.55.62.2.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
                "product": {
                  "name": "kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
                  "product_id": "kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
                "product": {
                  "name": "kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
                  "product_id": "kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
                "product": {
                  "name": "kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
                  "product_id": "kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
                "product": {
                  "name": "kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
                  "product_id": "kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-5.14.21-150500.55.62.2.aarch64",
                "product": {
                  "name": "kernel-default-5.14.21-150500.55.62.2.aarch64",
                  "product_id": "kernel-default-5.14.21-150500.55.62.2.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
                "product": {
                  "name": "kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
                  "product_id": "kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
                "product": {
                  "name": "kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
                  "product_id": "kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
                "product": {
                  "name": "kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
                  "product_id": "kernel-default-devel-5.14.21-150500.55.62.2.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
                "product": {
                  "name": "kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
                  "product_id": "kernel-default-extra-5.14.21-150500.55.62.2.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
                "product": {
                  "name": "kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
                  "product_id": "kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
                "product": {
                  "name": "kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
                  "product_id": "kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
                "product": {
                  "name": "kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
                  "product_id": "kernel-default-optional-5.14.21-150500.55.62.2.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
                "product": {
                  "name": "kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
                  "product_id": "kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
                "product": {
                  "name": "kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
                  "product_id": "kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
                "product": {
                  "name": "kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
                  "product_id": "kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
                "product": {
                  "name": "kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
                  "product_id": "kernel-obs-build-5.14.21-150500.55.62.2.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
                "product": {
                  "name": "kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
                  "product_id": "kernel-obs-qa-5.14.21-150500.55.62.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-syms-5.14.21-150500.55.62.1.aarch64",
                "product": {
                  "name": "kernel-syms-5.14.21-150500.55.62.1.aarch64",
                  "product_id": "kernel-syms-5.14.21-150500.55.62.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
                "product": {
                  "name": "kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
                  "product_id": "kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
                "product": {
                  "name": "kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
                  "product_id": "kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
                "product": {
                  "name": "ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
                  "product_id": "ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
                "product": {
                  "name": "ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
                  "product_id": "ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
                "product": {
                  "name": "reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
                  "product_id": "reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
                "product": {
                  "name": "reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
                  "product_id": "reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64"
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-devel-5.14.21-150500.55.62.2.noarch",
                "product": {
                  "name": "kernel-devel-5.14.21-150500.55.62.2.noarch",
                  "product_id": "kernel-devel-5.14.21-150500.55.62.2.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-docs-5.14.21-150500.55.62.2.noarch",
                "product": {
                  "name": "kernel-docs-5.14.21-150500.55.62.2.noarch",
                  "product_id": "kernel-docs-5.14.21-150500.55.62.2.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-docs-html-5.14.21-150500.55.62.2.noarch",
                "product": {
                  "name": "kernel-docs-html-5.14.21-150500.55.62.2.noarch",
                  "product_id": "kernel-docs-html-5.14.21-150500.55.62.2.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-macros-5.14.21-150500.55.62.2.noarch",
                "product": {
                  "name": "kernel-macros-5.14.21-150500.55.62.2.noarch",
                  "product_id": "kernel-macros-5.14.21-150500.55.62.2.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-source-5.14.21-150500.55.62.2.noarch",
                "product": {
                  "name": "kernel-source-5.14.21-150500.55.62.2.noarch",
                  "product_id": "kernel-source-5.14.21-150500.55.62.2.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
                "product": {
                  "name": "kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
                  "product_id": "kernel-source-vanilla-5.14.21-150500.55.62.2.noarch"
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
                "product": {
                  "name": "cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
                  "product_id": "cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
                "product": {
                  "name": "dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
                  "product_id": "dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
                "product": {
                  "name": "gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
                  "product_id": "gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-5.14.21-150500.55.62.2.ppc64le",
                "product": {
                  "name": "kernel-debug-5.14.21-150500.55.62.2.ppc64le",
                  "product_id": "kernel-debug-5.14.21-150500.55.62.2.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
                "product": {
                  "name": "kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
                  "product_id": "kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
                "product": {
                  "name": "kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
                  "product_id": "kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-5.14.21-150500.55.62.2.ppc64le",
                "product": {
                  "name": "kernel-default-5.14.21-150500.55.62.2.ppc64le",
                  "product_id": "kernel-default-5.14.21-150500.55.62.2.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
                "product": {
                  "name": "kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
                  "product_id": "kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
                "product": {
                  "name": "kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
                  "product_id": "kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
                "product": {
                  "name": "kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
                  "product_id": "kernel-default-devel-5.14.21-150500.55.62.2.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
                "product": {
                  "name": "kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
                  "product_id": "kernel-default-extra-5.14.21-150500.55.62.2.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
                "product": {
                  "name": "kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
                  "product_id": "kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
                "product": {
                  "name": "kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
                  "product_id": "kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
                "product": {
                  "name": "kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
                  "product_id": "kernel-default-optional-5.14.21-150500.55.62.2.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
                "product": {
                  "name": "kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
                  "product_id": "kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
                "product": {
                  "name": "kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
                  "product_id": "kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
                "product": {
                  "name": "kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
                  "product_id": "kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
                "product": {
                  "name": "kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
                  "product_id": "kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
                "product": {
                  "name": "kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
                  "product_id": "kernel-obs-build-5.14.21-150500.55.62.2.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
                "product": {
                  "name": "kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
                  "product_id": "kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-syms-5.14.21-150500.55.62.1.ppc64le",
                "product": {
                  "name": "kernel-syms-5.14.21-150500.55.62.1.ppc64le",
                  "product_id": "kernel-syms-5.14.21-150500.55.62.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
                "product": {
                  "name": "kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
                  "product_id": "kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
                "product": {
                  "name": "ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
                  "product_id": "ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
                "product": {
                  "name": "reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
                  "product_id": "reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le"
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
                "product": {
                  "name": "cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
                  "product_id": "cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
                "product": {
                  "name": "dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
                  "product_id": "dlm-kmp-default-5.14.21-150500.55.62.2.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
                "product": {
                  "name": "gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
                  "product_id": "gfs2-kmp-default-5.14.21-150500.55.62.2.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-5.14.21-150500.55.62.2.s390x",
                "product": {
                  "name": "kernel-default-5.14.21-150500.55.62.2.s390x",
                  "product_id": "kernel-default-5.14.21-150500.55.62.2.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-devel-5.14.21-150500.55.62.2.s390x",
                "product": {
                  "name": "kernel-default-devel-5.14.21-150500.55.62.2.s390x",
                  "product_id": "kernel-default-devel-5.14.21-150500.55.62.2.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-extra-5.14.21-150500.55.62.2.s390x",
                "product": {
                  "name": "kernel-default-extra-5.14.21-150500.55.62.2.s390x",
                  "product_id": "kernel-default-extra-5.14.21-150500.55.62.2.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
                "product": {
                  "name": "kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
                  "product_id": "kernel-default-livepatch-5.14.21-150500.55.62.2.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
                "product": {
                  "name": "kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
                  "product_id": "kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-optional-5.14.21-150500.55.62.2.s390x",
                "product": {
                  "name": "kernel-default-optional-5.14.21-150500.55.62.2.s390x",
                  "product_id": "kernel-default-optional-5.14.21-150500.55.62.2.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
                "product": {
                  "name": "kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
                  "product_id": "kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-build-5.14.21-150500.55.62.2.s390x",
                "product": {
                  "name": "kernel-obs-build-5.14.21-150500.55.62.2.s390x",
                  "product_id": "kernel-obs-build-5.14.21-150500.55.62.2.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
                "product": {
                  "name": "kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
                  "product_id": "kernel-obs-qa-5.14.21-150500.55.62.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-syms-5.14.21-150500.55.62.1.s390x",
                "product": {
                  "name": "kernel-syms-5.14.21-150500.55.62.1.s390x",
                  "product_id": "kernel-syms-5.14.21-150500.55.62.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
                "product": {
                  "name": "kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
                  "product_id": "kernel-zfcpdump-5.14.21-150500.55.62.2.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
                "product": {
                  "name": "kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
                  "product_id": "kselftests-kmp-default-5.14.21-150500.55.62.2.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
                "product": {
                  "name": "ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
                  "product_id": "ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
                "product": {
                  "name": "reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
                  "product_id": "reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x"
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
                "product": {
                  "name": "cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
                  "product_id": "cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
                "product": {
                  "name": "dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
                  "product_id": "dlm-kmp-default-5.14.21-150500.55.62.2.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
                "product": {
                  "name": "gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
                  "product_id": "gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-5.14.21-150500.55.62.2.x86_64",
                "product": {
                  "name": "kernel-debug-5.14.21-150500.55.62.2.x86_64",
                  "product_id": "kernel-debug-5.14.21-150500.55.62.2.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
                "product": {
                  "name": "kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
                  "product_id": "kernel-debug-devel-5.14.21-150500.55.62.2.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
                "product": {
                  "name": "kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
                  "product_id": "kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
                "product": {
                  "name": "kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
                  "product_id": "kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-5.14.21-150500.55.62.2.x86_64",
                "product": {
                  "name": "kernel-default-5.14.21-150500.55.62.2.x86_64",
                  "product_id": "kernel-default-5.14.21-150500.55.62.2.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
                "product": {
                  "name": "kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
                  "product_id": "kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
                "product": {
                  "name": "kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
                  "product_id": "kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
                "product": {
                  "name": "kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
                  "product_id": "kernel-default-devel-5.14.21-150500.55.62.2.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
                "product": {
                  "name": "kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
                  "product_id": "kernel-default-extra-5.14.21-150500.55.62.2.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
                "product": {
                  "name": "kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
                  "product_id": "kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
                "product": {
                  "name": "kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
                  "product_id": "kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
                "product": {
                  "name": "kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
                  "product_id": "kernel-default-optional-5.14.21-150500.55.62.2.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
                "product": {
                  "name": "kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
                  "product_id": "kernel-default-vdso-5.14.21-150500.55.62.2.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
                "product": {
                  "name": "kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
                  "product_id": "kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
                "product": {
                  "name": "kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
                  "product_id": "kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
                "product": {
                  "name": "kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
                  "product_id": "kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
                "product": {
                  "name": "kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
                  "product_id": "kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
                "product": {
                  "name": "kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
                  "product_id": "kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
                "product": {
                  "name": "kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
                  "product_id": "kernel-obs-build-5.14.21-150500.55.62.2.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
                "product": {
                  "name": "kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
                  "product_id": "kernel-obs-qa-5.14.21-150500.55.62.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-syms-5.14.21-150500.55.62.1.x86_64",
                "product": {
                  "name": "kernel-syms-5.14.21-150500.55.62.1.x86_64",
                  "product_id": "kernel-syms-5.14.21-150500.55.62.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
                "product": {
                  "name": "kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
                  "product_id": "kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
                "product": {
                  "name": "ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
                  "product_id": "ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
                "product": {
                  "name": "reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
                  "product_id": "reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Micro 5.5",
                "product": {
                  "name": "SUSE Linux Enterprise Micro 5.5",
                  "product_id": "SUSE Linux Enterprise Micro 5.5",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-micro:5.5"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Module for Basesystem 15 SP5",
                "product": {
                  "name": "SUSE Linux Enterprise Module for Basesystem 15 SP5",
                  "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-module-basesystem:15:sp5"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Module for Development Tools 15 SP5",
                "product": {
                  "name": "SUSE Linux Enterprise Module for Development Tools 15 SP5",
                  "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP5",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-module-development-tools:15:sp5"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Module for Legacy 15 SP5",
                "product": {
                  "name": "SUSE Linux Enterprise Module for Legacy 15 SP5",
                  "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP5",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-module-legacy:15:sp5"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Live Patching 15 SP5",
                "product": {
                  "name": "SUSE Linux Enterprise Live Patching 15 SP5",
                  "product_id": "SUSE Linux Enterprise Live Patching 15 SP5",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-module-live-patching:15:sp5"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise High Availability Extension 15 SP5",
                "product": {
                  "name": "SUSE Linux Enterprise High Availability Extension 15 SP5",
                  "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP5",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-ha:15:sp5"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Workstation Extension 15 SP5",
                "product": {
                  "name": "SUSE Linux Enterprise Workstation Extension 15 SP5",
                  "product_id": "SUSE Linux Enterprise Workstation Extension 15 SP5",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-we:15:sp5"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "openSUSE Leap 15.5",
                "product": {
                  "name": "openSUSE Leap 15.5",
                  "product_id": "openSUSE Leap 15.5",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:opensuse:leap:15.5"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "SUSE Linux Enterprise"
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-5.14.21-150500.55.62.2.aarch64 as component of SUSE Linux Enterprise Micro 5.5",
          "product_id": "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64"
        },
        "product_reference": "kernel-default-5.14.21-150500.55.62.2.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-5.14.21-150500.55.62.2.s390x as component of SUSE Linux Enterprise Micro 5.5",
          "product_id": "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x"
        },
        "product_reference": "kernel-default-5.14.21-150500.55.62.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-5.14.21-150500.55.62.2.x86_64 as component of SUSE Linux Enterprise Micro 5.5",
          "product_id": "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64"
        },
        "product_reference": "kernel-default-5.14.21-150500.55.62.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64 as component of SUSE Linux Enterprise Micro 5.5",
          "product_id": "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64"
        },
        "product_reference": "kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64 as component of SUSE Linux Enterprise Micro 5.5",
          "product_id": "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64"
        },
        "product_reference": "kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-64kb-5.14.21-150500.55.62.2.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64"
        },
        "product_reference": "kernel-64kb-5.14.21-150500.55.62.2.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64"
        },
        "product_reference": "kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-5.14.21-150500.55.62.2.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64"
        },
        "product_reference": "kernel-default-5.14.21-150500.55.62.2.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-5.14.21-150500.55.62.2.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le"
        },
        "product_reference": "kernel-default-5.14.21-150500.55.62.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-5.14.21-150500.55.62.2.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x"
        },
        "product_reference": "kernel-default-5.14.21-150500.55.62.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-5.14.21-150500.55.62.2.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64"
        },
        "product_reference": "kernel-default-5.14.21-150500.55.62.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64"
        },
        "product_reference": "kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le"
        },
        "product_reference": "kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64"
        },
        "product_reference": "kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-5.14.21-150500.55.62.2.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64"
        },
        "product_reference": "kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-5.14.21-150500.55.62.2.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le"
        },
        "product_reference": "kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-5.14.21-150500.55.62.2.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x"
        },
        "product_reference": "kernel-default-devel-5.14.21-150500.55.62.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-5.14.21-150500.55.62.2.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64"
        },
        "product_reference": "kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-5.14.21-150500.55.62.2.noarch as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch"
        },
        "product_reference": "kernel-devel-5.14.21-150500.55.62.2.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-macros-5.14.21-150500.55.62.2.noarch as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch"
        },
        "product_reference": "kernel-macros-5.14.21-150500.55.62.2.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-zfcpdump-5.14.21-150500.55.62.2.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x"
        },
        "product_reference": "kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-docs-5.14.21-150500.55.62.2.noarch as component of SUSE Linux Enterprise Module for Development Tools 15 SP5",
          "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch"
        },
        "product_reference": "kernel-docs-5.14.21-150500.55.62.2.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-obs-build-5.14.21-150500.55.62.2.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP5",
          "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64"
        },
        "product_reference": "kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-obs-build-5.14.21-150500.55.62.2.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP5",
          "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le"
        },
        "product_reference": "kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-obs-build-5.14.21-150500.55.62.2.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP5",
          "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x"
        },
        "product_reference": "kernel-obs-build-5.14.21-150500.55.62.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-obs-build-5.14.21-150500.55.62.2.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP5",
          "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64"
        },
        "product_reference": "kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-5.14.21-150500.55.62.2.noarch as component of SUSE Linux Enterprise Module for Development Tools 15 SP5",
          "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch"
        },
        "product_reference": "kernel-source-5.14.21-150500.55.62.2.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-5.14.21-150500.55.62.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP5",
          "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64"
        },
        "product_reference": "kernel-syms-5.14.21-150500.55.62.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-5.14.21-150500.55.62.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP5",
          "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le"
        },
        "product_reference": "kernel-syms-5.14.21-150500.55.62.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-5.14.21-150500.55.62.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP5",
          "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x"
        },
        "product_reference": "kernel-syms-5.14.21-150500.55.62.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-5.14.21-150500.55.62.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP5",
          "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64"
        },
        "product_reference": "kernel-syms-5.14.21-150500.55.62.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64 as component of SUSE Linux Enterprise Module for Legacy 15 SP5",
          "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64"
        },
        "product_reference": "reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le as component of SUSE Linux Enterprise Module for Legacy 15 SP5",
          "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le"
        },
        "product_reference": "reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x as component of SUSE Linux Enterprise Module for Legacy 15 SP5",
          "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x"
        },
        "product_reference": "reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64 as component of SUSE Linux Enterprise Module for Legacy 15 SP5",
          "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
        },
        "product_reference": "reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le"
        },
        "product_reference": "kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-livepatch-5.14.21-150500.55.62.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x"
        },
        "product_reference": "kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64"
        },
        "product_reference": "kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le"
        },
        "product_reference": "kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x"
        },
        "product_reference": "kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64"
        },
        "product_reference": "kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x"
        },
        "product_reference": "kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64"
        },
        "product_reference": "kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP5",
          "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64"
        },
        "product_reference": "cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP5",
          "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le"
        },
        "product_reference": "cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP5",
          "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x"
        },
        "product_reference": "cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP5",
          "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64"
        },
        "product_reference": "cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dlm-kmp-default-5.14.21-150500.55.62.2.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP5",
          "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64"
        },
        "product_reference": "dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP5",
          "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le"
        },
        "product_reference": "dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dlm-kmp-default-5.14.21-150500.55.62.2.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP5",
          "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x"
        },
        "product_reference": "dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dlm-kmp-default-5.14.21-150500.55.62.2.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP5",
          "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64"
        },
        "product_reference": "dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP5",
          "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64"
        },
        "product_reference": "gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP5",
          "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le"
        },
        "product_reference": "gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "gfs2-kmp-default-5.14.21-150500.55.62.2.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP5",
          "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x"
        },
        "product_reference": "gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP5",
          "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64"
        },
        "product_reference": "gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP5",
          "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64"
        },
        "product_reference": "ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP5",
          "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le"
        },
        "product_reference": "ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP5",
          "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x"
        },
        "product_reference": "ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP5",
          "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64"
        },
        "product_reference": "ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-extra-5.14.21-150500.55.62.2.x86_64 as component of SUSE Linux Enterprise Workstation Extension 15 SP5",
          "product_id": "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64"
        },
        "product_reference": "kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 15 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64"
        },
        "product_reference": "cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64"
        },
        "product_reference": "cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le"
        },
        "product_reference": "cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x"
        },
        "product_reference": "cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64"
        },
        "product_reference": "cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64"
        },
        "product_reference": "dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dlm-kmp-default-5.14.21-150500.55.62.2.aarch64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64"
        },
        "product_reference": "dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le"
        },
        "product_reference": "dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dlm-kmp-default-5.14.21-150500.55.62.2.s390x as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x"
        },
        "product_reference": "dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dlm-kmp-default-5.14.21-150500.55.62.2.x86_64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64"
        },
        "product_reference": "dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dtb-allwinner-5.14.21-150500.55.62.1.aarch64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64"
        },
        "product_reference": "dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dtb-altera-5.14.21-150500.55.62.1.aarch64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64"
        },
        "product_reference": "dtb-altera-5.14.21-150500.55.62.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dtb-amazon-5.14.21-150500.55.62.1.aarch64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64"
        },
        "product_reference": "dtb-amazon-5.14.21-150500.55.62.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dtb-amd-5.14.21-150500.55.62.1.aarch64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64"
        },
        "product_reference": "dtb-amd-5.14.21-150500.55.62.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dtb-amlogic-5.14.21-150500.55.62.1.aarch64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64"
        },
        "product_reference": "dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dtb-apm-5.14.21-150500.55.62.1.aarch64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64"
        },
        "product_reference": "dtb-apm-5.14.21-150500.55.62.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dtb-apple-5.14.21-150500.55.62.1.aarch64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64"
        },
        "product_reference": "dtb-apple-5.14.21-150500.55.62.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dtb-arm-5.14.21-150500.55.62.1.aarch64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64"
        },
        "product_reference": "dtb-arm-5.14.21-150500.55.62.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dtb-broadcom-5.14.21-150500.55.62.1.aarch64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64"
        },
        "product_reference": "dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dtb-cavium-5.14.21-150500.55.62.1.aarch64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64"
        },
        "product_reference": "dtb-cavium-5.14.21-150500.55.62.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dtb-exynos-5.14.21-150500.55.62.1.aarch64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64"
        },
        "product_reference": "dtb-exynos-5.14.21-150500.55.62.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dtb-freescale-5.14.21-150500.55.62.1.aarch64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64"
        },
        "product_reference": "dtb-freescale-5.14.21-150500.55.62.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dtb-hisilicon-5.14.21-150500.55.62.1.aarch64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64"
        },
        "product_reference": "dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dtb-lg-5.14.21-150500.55.62.1.aarch64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64"
        },
        "product_reference": "dtb-lg-5.14.21-150500.55.62.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dtb-marvell-5.14.21-150500.55.62.1.aarch64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64"
        },
        "product_reference": "dtb-marvell-5.14.21-150500.55.62.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dtb-mediatek-5.14.21-150500.55.62.1.aarch64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64"
        },
        "product_reference": "dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dtb-nvidia-5.14.21-150500.55.62.1.aarch64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64"
        },
        "product_reference": "dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dtb-qcom-5.14.21-150500.55.62.1.aarch64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64"
        },
        "product_reference": "dtb-qcom-5.14.21-150500.55.62.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dtb-renesas-5.14.21-150500.55.62.1.aarch64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64"
        },
        "product_reference": "dtb-renesas-5.14.21-150500.55.62.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dtb-rockchip-5.14.21-150500.55.62.1.aarch64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64"
        },
        "product_reference": "dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dtb-socionext-5.14.21-150500.55.62.1.aarch64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64"
        },
        "product_reference": "dtb-socionext-5.14.21-150500.55.62.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dtb-sprd-5.14.21-150500.55.62.1.aarch64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64"
        },
        "product_reference": "dtb-sprd-5.14.21-150500.55.62.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dtb-xilinx-5.14.21-150500.55.62.1.aarch64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64"
        },
        "product_reference": "dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64"
        },
        "product_reference": "gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64"
        },
        "product_reference": "gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le"
        },
        "product_reference": "gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "gfs2-kmp-default-5.14.21-150500.55.62.2.s390x as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x"
        },
        "product_reference": "gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64"
        },
        "product_reference": "gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-64kb-5.14.21-150500.55.62.2.aarch64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64"
        },
        "product_reference": "kernel-64kb-5.14.21-150500.55.62.2.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64"
        },
        "product_reference": "kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64"
        },
        "product_reference": "kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64"
        },
        "product_reference": "kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64"
        },
        "product_reference": "kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-5.14.21-150500.55.62.2.ppc64le as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le"
        },
        "product_reference": "kernel-debug-5.14.21-150500.55.62.2.ppc64le",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-5.14.21-150500.55.62.2.x86_64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64"
        },
        "product_reference": "kernel-debug-5.14.21-150500.55.62.2.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le"
        },
        "product_reference": "kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-5.14.21-150500.55.62.2.x86_64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64"
        },
        "product_reference": "kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le"
        },
        "product_reference": "kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64"
        },
        "product_reference": "kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64"
        },
        "product_reference": "kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-5.14.21-150500.55.62.2.aarch64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64"
        },
        "product_reference": "kernel-default-5.14.21-150500.55.62.2.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-5.14.21-150500.55.62.2.ppc64le as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le"
        },
        "product_reference": "kernel-default-5.14.21-150500.55.62.2.ppc64le",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-5.14.21-150500.55.62.2.s390x as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x"
        },
        "product_reference": "kernel-default-5.14.21-150500.55.62.2.s390x",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-5.14.21-150500.55.62.2.x86_64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64"
        },
        "product_reference": "kernel-default-5.14.21-150500.55.62.2.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64"
        },
        "product_reference": "kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le"
        },
        "product_reference": "kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64"
        },
        "product_reference": "kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64"
        },
        "product_reference": "kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le"
        },
        "product_reference": "kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64"
        },
        "product_reference": "kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-5.14.21-150500.55.62.2.aarch64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64"
        },
        "product_reference": "kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-5.14.21-150500.55.62.2.ppc64le as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le"
        },
        "product_reference": "kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-5.14.21-150500.55.62.2.s390x as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x"
        },
        "product_reference": "kernel-default-devel-5.14.21-150500.55.62.2.s390x",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-5.14.21-150500.55.62.2.x86_64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64"
        },
        "product_reference": "kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-extra-5.14.21-150500.55.62.2.aarch64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64"
        },
        "product_reference": "kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-extra-5.14.21-150500.55.62.2.ppc64le as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le"
        },
        "product_reference": "kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-extra-5.14.21-150500.55.62.2.s390x as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x"
        },
        "product_reference": "kernel-default-extra-5.14.21-150500.55.62.2.s390x",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-extra-5.14.21-150500.55.62.2.x86_64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64"
        },
        "product_reference": "kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64"
        },
        "product_reference": "kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le"
        },
        "product_reference": "kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-livepatch-5.14.21-150500.55.62.2.s390x as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x"
        },
        "product_reference": "kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64"
        },
        "product_reference": "kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64"
        },
        "product_reference": "kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le"
        },
        "product_reference": "kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x"
        },
        "product_reference": "kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64"
        },
        "product_reference": "kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-optional-5.14.21-150500.55.62.2.aarch64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64"
        },
        "product_reference": "kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-optional-5.14.21-150500.55.62.2.ppc64le as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le"
        },
        "product_reference": "kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-optional-5.14.21-150500.55.62.2.s390x as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x"
        },
        "product_reference": "kernel-default-optional-5.14.21-150500.55.62.2.s390x",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-optional-5.14.21-150500.55.62.2.x86_64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64"
        },
        "product_reference": "kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-vdso-5.14.21-150500.55.62.2.x86_64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64"
        },
        "product_reference": "kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-5.14.21-150500.55.62.2.noarch as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch"
        },
        "product_reference": "kernel-devel-5.14.21-150500.55.62.2.noarch",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-docs-5.14.21-150500.55.62.2.noarch as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch"
        },
        "product_reference": "kernel-docs-5.14.21-150500.55.62.2.noarch",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-docs-html-5.14.21-150500.55.62.2.noarch as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch"
        },
        "product_reference": "kernel-docs-html-5.14.21-150500.55.62.2.noarch",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64"
        },
        "product_reference": "kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le"
        },
        "product_reference": "kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64"
        },
        "product_reference": "kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64"
        },
        "product_reference": "kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le"
        },
        "product_reference": "kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64"
        },
        "product_reference": "kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64"
        },
        "product_reference": "kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le"
        },
        "product_reference": "kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64"
        },
        "product_reference": "kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64"
        },
        "product_reference": "kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-macros-5.14.21-150500.55.62.2.noarch as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch"
        },
        "product_reference": "kernel-macros-5.14.21-150500.55.62.2.noarch",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-obs-build-5.14.21-150500.55.62.2.aarch64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64"
        },
        "product_reference": "kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-obs-build-5.14.21-150500.55.62.2.ppc64le as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le"
        },
        "product_reference": "kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-obs-build-5.14.21-150500.55.62.2.s390x as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x"
        },
        "product_reference": "kernel-obs-build-5.14.21-150500.55.62.2.s390x",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-obs-build-5.14.21-150500.55.62.2.x86_64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64"
        },
        "product_reference": "kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-obs-qa-5.14.21-150500.55.62.1.aarch64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64"
        },
        "product_reference": "kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le"
        },
        "product_reference": "kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-obs-qa-5.14.21-150500.55.62.1.s390x as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x"
        },
        "product_reference": "kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-obs-qa-5.14.21-150500.55.62.1.x86_64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64"
        },
        "product_reference": "kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-5.14.21-150500.55.62.2.noarch as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch"
        },
        "product_reference": "kernel-source-5.14.21-150500.55.62.2.noarch",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-vanilla-5.14.21-150500.55.62.2.noarch as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch"
        },
        "product_reference": "kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-5.14.21-150500.55.62.1.aarch64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64"
        },
        "product_reference": "kernel-syms-5.14.21-150500.55.62.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-5.14.21-150500.55.62.1.ppc64le as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le"
        },
        "product_reference": "kernel-syms-5.14.21-150500.55.62.1.ppc64le",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-5.14.21-150500.55.62.1.s390x as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x"
        },
        "product_reference": "kernel-syms-5.14.21-150500.55.62.1.s390x",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-5.14.21-150500.55.62.1.x86_64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64"
        },
        "product_reference": "kernel-syms-5.14.21-150500.55.62.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-zfcpdump-5.14.21-150500.55.62.2.s390x as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x"
        },
        "product_reference": "kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64"
        },
        "product_reference": "kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64"
        },
        "product_reference": "kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le"
        },
        "product_reference": "kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kselftests-kmp-default-5.14.21-150500.55.62.2.s390x as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x"
        },
        "product_reference": "kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64"
        },
        "product_reference": "kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64"
        },
        "product_reference": "ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64"
        },
        "product_reference": "ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le"
        },
        "product_reference": "ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x"
        },
        "product_reference": "ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64"
        },
        "product_reference": "ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64"
        },
        "product_reference": "reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64"
        },
        "product_reference": "reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le"
        },
        "product_reference": "reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x"
        },
        "product_reference": "reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
        },
        "product_reference": "reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2021-47047",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47047"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nspi: spi-zynqmp-gqspi: return -ENOMEM if dma_map_single fails\n\nThe spi controller supports 44-bit address space on AXI in DMA mode,\nso set dma_addr_t width to 44-bit to avoid using a swiotlb mapping.\nIn addition, if dma_map_single fails, it should return immediately\ninstead of continuing doing the DMA operation which bases on invalid\naddress.\n\nThis fixes the following crash which occurs in reading a big block\nfrom flash:\n\n[  123.633577] zynqmp-qspi ff0f0000.spi: swiotlb buffer is full (sz: 4194304 bytes), total 32768 (slots), used 0 (slots)\n[  123.644230] zynqmp-qspi ff0f0000.spi: ERR:rxdma:memory not mapped\n[  123.784625] Unable to handle kernel paging request at virtual address 00000000003fffc0\n[  123.792536] Mem abort info:\n[  123.795313]   ESR = 0x96000145\n[  123.798351]   EC = 0x25: DABT (current EL), IL = 32 bits\n[  123.803655]   SET = 0, FnV = 0\n[  123.806693]   EA = 0, S1PTW = 0\n[  123.809818] Data abort info:\n[  123.812683]   ISV = 0, ISS = 0x00000145\n[  123.816503]   CM = 1, WnR = 1\n[  123.819455] user pgtable: 4k pages, 48-bit VAs, pgdp=0000000805047000\n[  123.825887] [00000000003fffc0] pgd=0000000803b45003, p4d=0000000803b45003, pud=0000000000000000\n[  123.834586] Internal error: Oops: 96000145 [#1] PREEMPT SMP",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47047",
          "url": "https://www.suse.com/security/cve/CVE-2021-47047"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1220761 for CVE-2021-47047",
          "url": "https://bugzilla.suse.com/1220761"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.6,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T09:29:37Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47047"
    },
    {
      "cve": "CVE-2021-47181",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47181"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: musb: tusb6010: check return value after calling platform_get_resource()\n\nIt will cause null-ptr-deref if platform_get_resource() returns NULL,\nwe need check the return value.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47181",
          "url": "https://www.suse.com/security/cve/CVE-2021-47181"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222660 for CVE-2021-47181",
          "url": "https://bugzilla.suse.com/1222660"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T09:29:37Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47181"
    },
    {
      "cve": "CVE-2021-47182",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47182"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: core: Fix scsi_mode_sense() buffer length handling\n\nSeveral problems exist with scsi_mode_sense() buffer length handling:\n\n 1) The allocation length field of the MODE SENSE(10) command is 16-bits,\n    occupying bytes 7 and 8 of the CDB. With this command, access to mode\n    pages larger than 255 bytes is thus possible. However, the CDB\n    allocation length field is set by assigning len to byte 8 only, thus\n    truncating buffer length larger than 255.\n\n 2) If scsi_mode_sense() is called with len smaller than 8 with\n    sdev-\u003euse_10_for_ms set, or smaller than 4 otherwise, the buffer length\n    is increased to 8 and 4 respectively, and the buffer is zero filled\n    with these increased values, thus corrupting the memory following the\n    buffer.\n\nFix these 2 problems by using put_unaligned_be16() to set the allocation\nlength field of MODE SENSE(10) CDB and by returning an error when len is\ntoo small.\n\nFurthermore, if len is larger than 255B, always try MODE SENSE(10) first,\neven if the device driver did not set sdev-\u003euse_10_for_ms. In case of\ninvalid opcode error for MODE SENSE(10), access to mode pages larger than\n255 bytes are not retried using MODE SENSE(6). To avoid buffer length\noverflows for the MODE_SENSE(10) case, check that len is smaller than 65535\nbytes.\n\nWhile at it, also fix the folowing:\n\n * Use get_unaligned_be16() to retrieve the mode data length and block\n   descriptor length fields of the mode sense reply header instead of using\n   an open coded calculation.\n\n * Fix the kdoc dbd argument explanation: the DBD bit stands for Disable\n   Block Descriptor, which is the opposite of what the dbd argument\n   description was.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47182",
          "url": "https://www.suse.com/security/cve/CVE-2021-47182"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222662 for CVE-2021-47182",
          "url": "https://bugzilla.suse.com/1222662"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T09:29:37Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47182"
    },
    {
      "cve": "CVE-2021-47183",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47183"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: lpfc: Fix link down processing to address NULL pointer dereference\n\nIf an FC link down transition while PLOGIs are outstanding to fabric well\nknown addresses, outstanding ABTS requests may result in a NULL pointer\ndereference. Driver unload requests may hang with repeated \"2878\" log\nmessages.\n\nThe Link down processing results in ABTS requests for outstanding ELS\nrequests. The Abort WQEs are sent for the ELSs before the driver had set\nthe link state to down. Thus the driver is sending the Abort with the\nexpectation that an ABTS will be sent on the wire. The Abort request is\nstalled waiting for the link to come up. In some conditions the driver may\nauto-complete the ELSs thus if the link does come up, the Abort completions\nmay reference an invalid structure.\n\nFix by ensuring that Abort set the flag to avoid link traffic if issued due\nto conditions where the link failed.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47183",
          "url": "https://www.suse.com/security/cve/CVE-2021-47183"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222664 for CVE-2021-47183",
          "url": "https://bugzilla.suse.com/1222664"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T09:29:37Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47183"
    },
    {
      "cve": "CVE-2021-47184",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47184"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ni40e: Fix NULL ptr dereference on VSI filter sync\n\nRemove the reason of null pointer dereference in sync VSI filters.\nAdded new I40E_VSI_RELEASING flag to signalize deleting and releasing\nof VSI resources to sync this thread with sync filters subtask.\nWithout this patch it is possible to start update the VSI filter list\nafter VSI is removed, that\u0027s causing a kernel oops.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47184",
          "url": "https://www.suse.com/security/cve/CVE-2021-47184"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222666 for CVE-2021-47184",
          "url": "https://bugzilla.suse.com/1222666"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T09:29:37Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47184"
    },
    {
      "cve": "CVE-2021-47185",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47185"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntty: tty_buffer: Fix the softlockup issue in flush_to_ldisc\n\nWhen running ltp testcase(ltp/testcases/kernel/pty/pty04.c) with arm64, there is a soft lockup,\nwhich look like this one:\n\n  Workqueue: events_unbound flush_to_ldisc\n  Call trace:\n   dump_backtrace+0x0/0x1ec\n   show_stack+0x24/0x30\n   dump_stack+0xd0/0x128\n   panic+0x15c/0x374\n   watchdog_timer_fn+0x2b8/0x304\n   __run_hrtimer+0x88/0x2c0\n   __hrtimer_run_queues+0xa4/0x120\n   hrtimer_interrupt+0xfc/0x270\n   arch_timer_handler_phys+0x40/0x50\n   handle_percpu_devid_irq+0x94/0x220\n   __handle_domain_irq+0x88/0xf0\n   gic_handle_irq+0x84/0xfc\n   el1_irq+0xc8/0x180\n   slip_unesc+0x80/0x214 [slip]\n   tty_ldisc_receive_buf+0x64/0x80\n   tty_port_default_receive_buf+0x50/0x90\n   flush_to_ldisc+0xbc/0x110\n   process_one_work+0x1d4/0x4b0\n   worker_thread+0x180/0x430\n   kthread+0x11c/0x120\n\nIn the testcase pty04, The first process call the write syscall to send\ndata to the pty master. At the same time, the workqueue will do the\nflush_to_ldisc to pop data in a loop until there is no more data left.\nWhen the sender and workqueue running in different core, the sender sends\ndata fastly in full time which will result in workqueue doing work in loop\nfor a long time and occuring softlockup in flush_to_ldisc with kernel\nconfigured without preempt. So I add need_resched check and cond_resched\nin the flush_to_ldisc loop to avoid it.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47185",
          "url": "https://www.suse.com/security/cve/CVE-2021-47185"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222669 for CVE-2021-47185",
          "url": "https://bugzilla.suse.com/1222669"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T09:29:37Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47185"
    },
    {
      "cve": "CVE-2021-47187",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47187"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\narm64: dts: qcom: msm8998: Fix CPU/L2 idle state latency and residency\n\nThe entry/exit latency and minimum residency in state for the idle\nstates of MSM8998 were ..bad: first of all, for all of them the\ntimings were written for CPU sleep but the min-residency-us param\nwas miscalculated (supposedly, while porting this from downstream);\nThen, the power collapse states are setting PC on both the CPU\ncluster *and* the L2 cache, which have different timings: in the\nspecific case of L2 the times are higher so these ones should be\ntaken into account instead of the CPU ones.\n\nThis parameter misconfiguration was not giving particular issues\nbecause on MSM8998 there was no CPU scaling at all, so cluster/L2\npower collapse was rarely (if ever) hit.\nWhen CPU scaling is enabled, though, the wrong timings will produce\nSoC unstability shown to the user as random, apparently error-less,\nsudden reboots and/or lockups.\n\nThis set of parameters are stabilizing the SoC when CPU scaling is\nON and when power collapse is frequently hit.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47187",
          "url": "https://www.suse.com/security/cve/CVE-2021-47187"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222703 for CVE-2021-47187",
          "url": "https://bugzilla.suse.com/1222703"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T09:29:37Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47187"
    },
    {
      "cve": "CVE-2021-47188",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47188"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: ufs: core: Improve SCSI abort handling\n\nThe following has been observed on a test setup:\n\nWARNING: CPU: 4 PID: 250 at drivers/scsi/ufs/ufshcd.c:2737 ufshcd_queuecommand+0x468/0x65c\nCall trace:\n ufshcd_queuecommand+0x468/0x65c\n scsi_send_eh_cmnd+0x224/0x6a0\n scsi_eh_test_devices+0x248/0x418\n scsi_eh_ready_devs+0xc34/0xe58\n scsi_error_handler+0x204/0x80c\n kthread+0x150/0x1b4\n ret_from_fork+0x10/0x30\n\nThat warning is triggered by the following statement:\n\n\tWARN_ON(lrbp-\u003ecmd);\n\nFix this warning by clearing lrbp-\u003ecmd from the abort handler.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47188",
          "url": "https://www.suse.com/security/cve/CVE-2021-47188"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222671 for CVE-2021-47188",
          "url": "https://bugzilla.suse.com/1222671"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T09:29:37Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47188"
    },
    {
      "cve": "CVE-2021-47189",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47189"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: fix memory ordering between normal and ordered work functions\n\nOrdered work functions aren\u0027t guaranteed to be handled by the same thread\nwhich executed the normal work functions. The only way execution between\nnormal/ordered functions is synchronized is via the WORK_DONE_BIT,\nunfortunately the used bitops don\u0027t guarantee any ordering whatsoever.\n\nThis manifested as seemingly inexplicable crashes on ARM64, where\nasync_chunk::inode is seen as non-null in async_cow_submit which causes\nsubmit_compressed_extents to be called and crash occurs because\nasync_chunk::inode suddenly became NULL. The call trace was similar to:\n\n    pc : submit_compressed_extents+0x38/0x3d0\n    lr : async_cow_submit+0x50/0xd0\n    sp : ffff800015d4bc20\n\n    \u003cregisters omitted for brevity\u003e\n\n    Call trace:\n     submit_compressed_extents+0x38/0x3d0\n     async_cow_submit+0x50/0xd0\n     run_ordered_work+0xc8/0x280\n     btrfs_work_helper+0x98/0x250\n     process_one_work+0x1f0/0x4ac\n     worker_thread+0x188/0x504\n     kthread+0x110/0x114\n     ret_from_fork+0x10/0x18\n\nFix this by adding respective barrier calls which ensure that all\naccesses preceding setting of WORK_DONE_BIT are strictly ordered before\nsetting the flag. At the same time add a read barrier after reading of\nWORK_DONE_BIT in run_ordered_work which ensures all subsequent loads\nwould be strictly ordered after reading the bit. This in turn ensures\nare all accesses before WORK_DONE_BIT are going to be strictly ordered\nbefore any access that can occur in ordered_func.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47189",
          "url": "https://www.suse.com/security/cve/CVE-2021-47189"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222706 for CVE-2021-47189",
          "url": "https://bugzilla.suse.com/1222706"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T09:29:37Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47189"
    },
    {
      "cve": "CVE-2021-47191",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47191"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: scsi_debug: Fix out-of-bound read in resp_readcap16()\n\nThe following warning was observed running syzkaller:\n\n[ 3813.830724] sg_write: data in/out 65466/242 bytes for SCSI command 0x9e-- guessing data in;\n[ 3813.830724]    program syz-executor not setting count and/or reply_len properly\n[ 3813.836956] ==================================================================\n[ 3813.839465] BUG: KASAN: stack-out-of-bounds in sg_copy_buffer+0x157/0x1e0\n[ 3813.841773] Read of size 4096 at addr ffff8883cf80f540 by task syz-executor/1549\n[ 3813.846612] Call Trace:\n[ 3813.846995]  dump_stack+0x108/0x15f\n[ 3813.847524]  print_address_description+0xa5/0x372\n[ 3813.848243]  kasan_report.cold+0x236/0x2a8\n[ 3813.849439]  check_memory_region+0x240/0x270\n[ 3813.850094]  memcpy+0x30/0x80\n[ 3813.850553]  sg_copy_buffer+0x157/0x1e0\n[ 3813.853032]  sg_copy_from_buffer+0x13/0x20\n[ 3813.853660]  fill_from_dev_buffer+0x135/0x370\n[ 3813.854329]  resp_readcap16+0x1ac/0x280\n[ 3813.856917]  schedule_resp+0x41f/0x1630\n[ 3813.858203]  scsi_debug_queuecommand+0xb32/0x17e0\n[ 3813.862699]  scsi_dispatch_cmd+0x330/0x950\n[ 3813.863329]  scsi_request_fn+0xd8e/0x1710\n[ 3813.863946]  __blk_run_queue+0x10b/0x230\n[ 3813.864544]  blk_execute_rq_nowait+0x1d8/0x400\n[ 3813.865220]  sg_common_write.isra.0+0xe61/0x2420\n[ 3813.871637]  sg_write+0x6c8/0xef0\n[ 3813.878853]  __vfs_write+0xe4/0x800\n[ 3813.883487]  vfs_write+0x17b/0x530\n[ 3813.884008]  ksys_write+0x103/0x270\n[ 3813.886268]  __x64_sys_write+0x77/0xc0\n[ 3813.886841]  do_syscall_64+0x106/0x360\n[ 3813.887415]  entry_SYSCALL_64_after_hwframe+0x44/0xa9\n\nThis issue can be reproduced with the following syzkaller log:\n\nr0 = openat(0xffffffffffffff9c, \u0026(0x7f0000000040)=\u0027./file0\\x00\u0027, 0x26e1, 0x0)\nr1 = syz_open_procfs(0xffffffffffffffff, \u0026(0x7f0000000000)=\u0027fd/3\\x00\u0027)\nopen_by_handle_at(r1, \u0026(0x7f00000003c0)=ANY=[@ANYRESHEX], 0x602000)\nr2 = syz_open_dev$sg(\u0026(0x7f0000000000), 0x0, 0x40782)\nwrite$binfmt_aout(r2, \u0026(0x7f0000000340)=ANY=[@ANYBLOB=\"00000000deff000000000000000000000000000000000000000000000000000047f007af9e107a41ec395f1bded7be24277a1501ff6196a83366f4e6362bc0ff2b247f68a972989b094b2da4fb3607fcf611a22dd04310d28c75039d\"], 0x126)\n\nIn resp_readcap16() we get \"int alloc_len\" value -1104926854, and then pass\nthe huge arr_len to fill_from_dev_buffer(), but arr is only 32 bytes. This\nleads to OOB in sg_copy_buffer().\n\nTo solve this issue, define alloc_len as u32.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47191",
          "url": "https://www.suse.com/security/cve/CVE-2021-47191"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222866 for CVE-2021-47191",
          "url": "https://bugzilla.suse.com/1222866"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T09:29:37Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47191"
    },
    {
      "cve": "CVE-2021-47192",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47192"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: core: sysfs: Fix hang when device state is set via sysfs\n\nThis fixes a regression added with:\n\ncommit f0f82e2476f6 (\"scsi: core: Fix capacity set to zero after\nofflinining device\")\n\nThe problem is that after iSCSI recovery, iscsid will call into the kernel\nto set the dev\u0027s state to running, and with that patch we now call\nscsi_rescan_device() with the state_mutex held. If the SCSI error handler\nthread is just starting to test the device in scsi_send_eh_cmnd() then it\u0027s\ngoing to try to grab the state_mutex.\n\nWe are then stuck, because when scsi_rescan_device() tries to send its I/O\nscsi_queue_rq() calls -\u003e scsi_host_queue_ready() -\u003e scsi_host_in_recovery()\nwhich will return true (the host state is still in recovery) and I/O will\njust be requeued. scsi_send_eh_cmnd() will then never be able to grab the\nstate_mutex to finish error handling.\n\nTo prevent the deadlock move the rescan-related code to after we drop the\nstate_mutex.\n\nThis also adds a check for if we are already in the running state. This\nprevents extra scans and helps the iscsid case where if the transport class\nhas already onlined the device during its recovery process then we don\u0027t\nneed userspace to do it again plus possibly block that daemon.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47192",
          "url": "https://www.suse.com/security/cve/CVE-2021-47192"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222867 for CVE-2021-47192",
          "url": "https://bugzilla.suse.com/1222867"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T09:29:37Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47192"
    },
    {
      "cve": "CVE-2021-47193",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47193"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: pm80xx: Fix memory leak during rmmod\n\nDriver failed to release all memory allocated. This would lead to memory\nleak during driver removal.\n\nProperly free memory when the module is removed.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47193",
          "url": "https://www.suse.com/security/cve/CVE-2021-47193"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222879 for CVE-2021-47193",
          "url": "https://bugzilla.suse.com/1222879"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T09:29:37Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47193"
    },
    {
      "cve": "CVE-2021-47194",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47194"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncfg80211: call cfg80211_stop_ap when switch from P2P_GO type\n\nIf the userspace tools switch from NL80211_IFTYPE_P2P_GO to\nNL80211_IFTYPE_ADHOC via send_msg(NL80211_CMD_SET_INTERFACE), it\ndoes not call the cleanup cfg80211_stop_ap(), this leads to the\ninitialization of in-use data. For example, this path re-init the\nsdata-\u003eassigned_chanctx_list while it is still an element of\nassigned_vifs list, and makes that linked list corrupt.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47194",
          "url": "https://www.suse.com/security/cve/CVE-2021-47194"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222829 for CVE-2021-47194",
          "url": "https://bugzilla.suse.com/1222829"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T09:29:37Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47194"
    },
    {
      "cve": "CVE-2021-47195",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47195"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nspi: fix use-after-free of the add_lock mutex\n\nCommit 6098475d4cb4 (\"spi: Fix deadlock when adding SPI controllers on\nSPI buses\") introduced a per-controller mutex. But mutex_unlock() of\nsaid lock is called after the controller is already freed:\n\n  spi_unregister_controller(ctlr)\n  -\u003e put_device(\u0026ctlr-\u003edev)\n    -\u003e spi_controller_release(dev)\n  -\u003e mutex_unlock(\u0026ctrl-\u003eadd_lock)\n\nMove the put_device() after the mutex_unlock().",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47195",
          "url": "https://www.suse.com/security/cve/CVE-2021-47195"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222832 for CVE-2021-47195",
          "url": "https://bugzilla.suse.com/1222832"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T09:29:37Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47195"
    },
    {
      "cve": "CVE-2021-47196",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47196"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/core: Set send and receive CQ before forwarding to the driver\n\nPreset both receive and send CQ pointers prior to call to the drivers and\noverwrite it later again till the mlx4 is going to be changed do not\noverwrite ibqp properties.\n\nThis change is needed for mlx5, because in case of QP creation failure, it\nwill go to the path of QP destroy which relies on proper CQ pointers.\n\n BUG: KASAN: use-after-free in create_qp.cold+0x164/0x16e [mlx5_ib]\n Write of size 8 at addr ffff8880064c55c0 by task a.out/246\n\n CPU: 0 PID: 246 Comm: a.out Not tainted 5.15.0+ #291\n Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014\n Call Trace:\n  dump_stack_lvl+0x45/0x59\n  print_address_description.constprop.0+0x1f/0x140\n  kasan_report.cold+0x83/0xdf\n  create_qp.cold+0x164/0x16e [mlx5_ib]\n  mlx5_ib_create_qp+0x358/0x28a0 [mlx5_ib]\n  create_qp.part.0+0x45b/0x6a0 [ib_core]\n  ib_create_qp_user+0x97/0x150 [ib_core]\n  ib_uverbs_handler_UVERBS_METHOD_QP_CREATE+0x92c/0x1250 [ib_uverbs]\n  ib_uverbs_cmd_verbs+0x1c38/0x3150 [ib_uverbs]\n  ib_uverbs_ioctl+0x169/0x260 [ib_uverbs]\n  __x64_sys_ioctl+0x866/0x14d0\n  do_syscall_64+0x3d/0x90\n  entry_SYSCALL_64_after_hwframe+0x44/0xae\n\n Allocated by task 246:\n  kasan_save_stack+0x1b/0x40\n  __kasan_kmalloc+0xa4/0xd0\n  create_qp.part.0+0x92/0x6a0 [ib_core]\n  ib_create_qp_user+0x97/0x150 [ib_core]\n  ib_uverbs_handler_UVERBS_METHOD_QP_CREATE+0x92c/0x1250 [ib_uverbs]\n  ib_uverbs_cmd_verbs+0x1c38/0x3150 [ib_uverbs]\n  ib_uverbs_ioctl+0x169/0x260 [ib_uverbs]\n  __x64_sys_ioctl+0x866/0x14d0\n  do_syscall_64+0x3d/0x90\n  entry_SYSCALL_64_after_hwframe+0x44/0xae\n\n Freed by task 246:\n  kasan_save_stack+0x1b/0x40\n  kasan_set_track+0x1c/0x30\n  kasan_set_free_info+0x20/0x30\n  __kasan_slab_free+0x10c/0x150\n  slab_free_freelist_hook+0xb4/0x1b0\n  kfree+0xe7/0x2a0\n  create_qp.part.0+0x52b/0x6a0 [ib_core]\n  ib_create_qp_user+0x97/0x150 [ib_core]\n  ib_uverbs_handler_UVERBS_METHOD_QP_CREATE+0x92c/0x1250 [ib_uverbs]\n  ib_uverbs_cmd_verbs+0x1c38/0x3150 [ib_uverbs]\n  ib_uverbs_ioctl+0x169/0x260 [ib_uverbs]\n  __x64_sys_ioctl+0x866/0x14d0\n  do_syscall_64+0x3d/0x90\n  entry_SYSCALL_64_after_hwframe+0x44/0xae",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47196",
          "url": "https://www.suse.com/security/cve/CVE-2021-47196"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222773 for CVE-2021-47196",
          "url": "https://bugzilla.suse.com/1222773"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T09:29:37Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47196"
    },
    {
      "cve": "CVE-2021-47197",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47197"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/mlx5e: nullify cq-\u003edbg pointer in mlx5_debug_cq_remove()\n\nPrior to this patch in case mlx5_core_destroy_cq() failed it proceeds\nto rest of destroy operations. mlx5_core_destroy_cq() could be called again\nby user and cause additional call of mlx5_debug_cq_remove().\ncq-\u003edbg was not nullify in previous call and cause the crash.\n\nFix it by nullify cq-\u003edbg pointer after removal.\n\nAlso proceed to destroy operations only if FW return 0\nfor MLX5_CMD_OP_DESTROY_CQ command.\n\ngeneral protection fault, probably for non-canonical address 0x2000300004058: 0000 [#1] SMP PTI\nCPU: 5 PID: 1228 Comm: python Not tainted 5.15.0-rc5_for_upstream_min_debug_2021_10_14_11_06 #1\nHardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014\nRIP: 0010:lockref_get+0x1/0x60\nCode: 5d e9 53 ff ff ff 48 8d 7f 70 e8 0a 2e 48 00 c7 85 d0 00 00 00 02\n00 00 00 c6 45 70 00 fb 5d c3 c3 cc cc cc cc cc cc cc cc 53 \u003c48\u003e 8b 17\n48 89 fb 85 d2 75 3d 48 89 d0 bf 64 00 00 00 48 89 c1 48\nRSP: 0018:ffff888137dd7a38 EFLAGS: 00010206\nRAX: 0000000000000000 RBX: ffff888107d5f458 RCX: 00000000fffffffe\nRDX: 000000000002c2b0 RSI: ffffffff8155e2e0 RDI: 0002000300004058\nRBP: ffff888137dd7a88 R08: 0002000300004058 R09: ffff8881144a9f88\nR10: 0000000000000000 R11: 0000000000000000 R12: ffff8881141d4000\nR13: ffff888137dd7c68 R14: ffff888137dd7d58 R15: ffff888137dd7cc0\nFS:  00007f4644f2a4c0(0000) GS:ffff8887a2d40000(0000)\nknlGS:0000000000000000\nCS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 000055b4500f4380 CR3: 0000000114f7a003 CR4: 0000000000170ea0\nCall Trace:\n  simple_recursive_removal+0x33/0x2e0\n  ? debugfs_remove+0x60/0x60\n  debugfs_remove+0x40/0x60\n  mlx5_debug_cq_remove+0x32/0x70 [mlx5_core]\n  mlx5_core_destroy_cq+0x41/0x1d0 [mlx5_core]\n  devx_obj_cleanup+0x151/0x330 [mlx5_ib]\n  ? __pollwait+0xd0/0xd0\n  ? xas_load+0x5/0x70\n  ? xa_load+0x62/0xa0\n  destroy_hw_idr_uobject+0x20/0x80 [ib_uverbs]\n  uverbs_destroy_uobject+0x3b/0x360 [ib_uverbs]\n  uobj_destroy+0x54/0xa0 [ib_uverbs]\n  ib_uverbs_cmd_verbs+0xaf2/0x1160 [ib_uverbs]\n  ? uverbs_finalize_object+0xd0/0xd0 [ib_uverbs]\n  ib_uverbs_ioctl+0xc4/0x1b0 [ib_uverbs]\n  __x64_sys_ioctl+0x3e4/0x8e0",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47197",
          "url": "https://www.suse.com/security/cve/CVE-2021-47197"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222776 for CVE-2021-47197",
          "url": "https://bugzilla.suse.com/1222776"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T09:29:37Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47197"
    },
    {
      "cve": "CVE-2021-47198",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47198"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: lpfc: Fix use-after-free in lpfc_unreg_rpi() routine\n\nAn error is detected with the following report when unloading the driver:\n  \"KASAN: use-after-free in lpfc_unreg_rpi+0x1b1b\"\n\nThe NLP_REG_LOGIN_SEND nlp_flag is set in lpfc_reg_fab_ctrl_node(), but the\nflag is not cleared upon completion of the login.\n\nThis allows a second call to lpfc_unreg_rpi() to proceed with nlp_rpi set\nto LPFC_RPI_ALLOW_ERROR.  This results in a use after free access when used\nas an rpi_ids array index.\n\nFix by clearing the NLP_REG_LOGIN_SEND nlp_flag in\nlpfc_mbx_cmpl_fc_reg_login().",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47198",
          "url": "https://www.suse.com/security/cve/CVE-2021-47198"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222883 for CVE-2021-47198",
          "url": "https://bugzilla.suse.com/1222883"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T09:29:37Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47198"
    },
    {
      "cve": "CVE-2021-47199",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47199"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/mlx5e: CT, Fix multiple allocations and memleak of mod acts\n\nCT clear action offload adds additional mod hdr actions to the\nflow\u0027s original mod actions in order to clear the registers which\nhold ct_state.\nWhen such flow also includes encap action, a neigh update event\ncan cause the driver to unoffload the flow and then reoffload it.\n\nEach time this happens, the ct clear handling adds that same set\nof mod hdr actions to reset ct_state until the max of mod hdr\nactions is reached.\n\nAlso the driver never releases the allocated mod hdr actions and\ncausing a memleak.\n\nFix above two issues by moving CT clear mod acts allocation\ninto the parsing actions phase and only use it when offloading the rule.\nThe release of mod acts will be done in the normal flow_put().\n\n backtrace:\n    [\u003c000000007316e2f3\u003e] krealloc+0x83/0xd0\n    [\u003c00000000ef157de1\u003e] mlx5e_mod_hdr_alloc+0x147/0x300 [mlx5_core]\n    [\u003c00000000970ce4ae\u003e] mlx5e_tc_match_to_reg_set_and_get_id+0xd7/0x240 [mlx5_core]\n    [\u003c0000000067c5fa17\u003e] mlx5e_tc_match_to_reg_set+0xa/0x20 [mlx5_core]\n    [\u003c00000000d032eb98\u003e] mlx5_tc_ct_entry_set_registers.isra.0+0x36/0xc0 [mlx5_core]\n    [\u003c00000000fd23b869\u003e] mlx5_tc_ct_flow_offload+0x272/0x1f10 [mlx5_core]\n    [\u003c000000004fc24acc\u003e] mlx5e_tc_offload_fdb_rules.part.0+0x150/0x620 [mlx5_core]\n    [\u003c00000000dc741c17\u003e] mlx5e_tc_encap_flows_add+0x489/0x690 [mlx5_core]\n    [\u003c00000000e92e49d7\u003e] mlx5e_rep_update_flows+0x6e4/0x9b0 [mlx5_core]\n    [\u003c00000000f60f5602\u003e] mlx5e_rep_neigh_update+0x39a/0x5d0 [mlx5_core]",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47199",
          "url": "https://www.suse.com/security/cve/CVE-2021-47199"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222785 for CVE-2021-47199",
          "url": "https://bugzilla.suse.com/1222785"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T09:29:37Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47199"
    },
    {
      "cve": "CVE-2021-47200",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47200"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/prime: Fix use after free in mmap with drm_gem_ttm_mmap\n\ndrm_gem_ttm_mmap() drops a reference to the gem object on success. If\nthe gem object\u0027s refcount == 1 on entry to drm_gem_prime_mmap(), that\ndrop will free the gem object, and the subsequent drm_gem_object_get()\nwill be a UAF. Fix by grabbing a reference before calling the mmap\nhelper.\n\nThis issue was forseen when the reference dropping was adding in\ncommit 9786b65bc61ac (\"drm/ttm: fix mmap refcounting\"):\n  \"For that to work properly the drm_gem_object_get() call in\n  drm_gem_ttm_mmap() must be moved so it happens before calling\n  obj-\u003efuncs-\u003emmap(), otherwise the gem refcount would go down\n  to zero.\"",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47200",
          "url": "https://www.suse.com/security/cve/CVE-2021-47200"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222838 for CVE-2021-47200",
          "url": "https://bugzilla.suse.com/1222838"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T09:29:37Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47200"
    },
    {
      "cve": "CVE-2021-47201",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47201"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\niavf: free q_vectors before queues in iavf_disable_vf\n\niavf_free_queues() clears adapter-\u003enum_active_queues, which\niavf_free_q_vectors() relies on, so swap the order of these two function\ncalls in iavf_disable_vf(). This resolves a panic encountered when the\ninterface is disabled and then later brought up again after PF\ncommunication is restored.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47201",
          "url": "https://www.suse.com/security/cve/CVE-2021-47201"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222792 for CVE-2021-47201",
          "url": "https://bugzilla.suse.com/1222792"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T09:29:37Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47201"
    },
    {
      "cve": "CVE-2021-47202",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47202"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nthermal: Fix NULL pointer dereferences in of_thermal_ functions\n\nof_parse_thermal_zones() parses the thermal-zones node and registers a\nthermal_zone device for each subnode. However, if a thermal zone is\nconsuming a thermal sensor and that thermal sensor device hasn\u0027t probed\nyet, an attempt to set trip_point_*_temp for that thermal zone device\ncan cause a NULL pointer dereference. Fix it.\n\n console:/sys/class/thermal/thermal_zone87 # echo 120000 \u003e trip_point_0_temp\n ...\n Unable to handle kernel NULL pointer dereference at virtual address 0000000000000020\n ...\n Call trace:\n  of_thermal_set_trip_temp+0x40/0xc4\n  trip_point_temp_store+0xc0/0x1dc\n  dev_attr_store+0x38/0x88\n  sysfs_kf_write+0x64/0xc0\n  kernfs_fop_write_iter+0x108/0x1d0\n  vfs_write+0x2f4/0x368\n  ksys_write+0x7c/0xec\n  __arm64_sys_write+0x20/0x30\n  el0_svc_common.llvm.7279915941325364641+0xbc/0x1bc\n  do_el0_svc+0x28/0xa0\n  el0_svc+0x14/0x24\n  el0_sync_handler+0x88/0xec\n  el0_sync+0x1c0/0x200\n\nWhile at it, fix the possible NULL pointer dereference in other\nfunctions as well: of_thermal_get_temp(), of_thermal_set_emul_temp(),\nof_thermal_get_trend().",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47202",
          "url": "https://www.suse.com/security/cve/CVE-2021-47202"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222878 for CVE-2021-47202",
          "url": "https://bugzilla.suse.com/1222878"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T09:29:37Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47202"
    },
    {
      "cve": "CVE-2021-47203",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47203"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: lpfc: Fix list_add() corruption in lpfc_drain_txq()\n\nWhen parsing the txq list in lpfc_drain_txq(), the driver attempts to pass\nthe requests to the adapter. If such an attempt fails, a local \"fail_msg\"\nstring is set and a log message output.  The job is then added to a\ncompletions list for cancellation.\n\nProcessing of any further jobs from the txq list continues, but since\n\"fail_msg\" remains set, jobs are added to the completions list regardless\nof whether a wqe was passed to the adapter.  If successfully added to\ntxcmplq, jobs are added to both lists resulting in list corruption.\n\nFix by clearing the fail_msg string after adding a job to the completions\nlist. This stops the subsequent jobs from being added to the completions\nlist unless they had an appropriate failure.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47203",
          "url": "https://www.suse.com/security/cve/CVE-2021-47203"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222881 for CVE-2021-47203",
          "url": "https://bugzilla.suse.com/1222881"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T09:29:37Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47203"
    },
    {
      "cve": "CVE-2021-47204",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47204"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: dpaa2-eth: fix use-after-free in dpaa2_eth_remove\n\nAccess to netdev after free_netdev() will cause use-after-free bug.\nMove debug log before free_netdev() call to avoid it.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47204",
          "url": "https://www.suse.com/security/cve/CVE-2021-47204"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222787 for CVE-2021-47204",
          "url": "https://bugzilla.suse.com/1222787"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T09:29:37Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47204"
    },
    {
      "cve": "CVE-2021-47205",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47205"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nclk: sunxi-ng: Unregister clocks/resets when unbinding\n\nCurrently, unbinding a CCU driver unmaps the device\u0027s MMIO region, while\nleaving its clocks/resets and their providers registered. This can cause\na page fault later when some clock operation tries to perform MMIO. Fix\nthis by separating the CCU initialization from the memory allocation,\nand then using a devres callback to unregister the clocks and resets.\n\nThis also fixes a memory leak of the `struct ccu_reset`, and uses the\ncorrect owner (the specific platform driver) for the clocks and resets.\n\nEarly OF clock providers are never unregistered, and limited error\nhandling is possible, so they are mostly unchanged. The error reporting\nis made more consistent by moving the message inside of_sunxi_ccu_probe.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47205",
          "url": "https://www.suse.com/security/cve/CVE-2021-47205"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222888 for CVE-2021-47205",
          "url": "https://bugzilla.suse.com/1222888"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T09:29:37Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47205"
    },
    {
      "cve": "CVE-2021-47206",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47206"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: host: ohci-tmio: check return value after calling platform_get_resource()\n\nIt will cause null-ptr-deref if platform_get_resource() returns NULL,\nwe need check the return value.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47206",
          "url": "https://www.suse.com/security/cve/CVE-2021-47206"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222894 for CVE-2021-47206",
          "url": "https://bugzilla.suse.com/1222894"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T09:29:37Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47206"
    },
    {
      "cve": "CVE-2021-47207",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47207"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: gus: fix null pointer dereference on pointer block\n\nThe pointer block return from snd_gf1_dma_next_block could be\nnull, so there is a potential null pointer dereference issue.\nFix this by adding a null check before dereference.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47207",
          "url": "https://www.suse.com/security/cve/CVE-2021-47207"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222790 for CVE-2021-47207",
          "url": "https://bugzilla.suse.com/1222790"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T09:29:37Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47207"
    },
    {
      "cve": "CVE-2021-47209",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47209"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsched/fair: Prevent dead task groups from regaining cfs_rq\u0027s\n\nKevin is reporting crashes which point to a use-after-free of a cfs_rq\nin update_blocked_averages(). Initial debugging revealed that we\u0027ve\nlive cfs_rq\u0027s (on_list=1) in an about to be kfree()\u0027d task group in\nfree_fair_sched_group(). However, it was unclear how that can happen.\n\nHis kernel config happened to lead to a layout of struct sched_entity\nthat put the \u0027my_q\u0027 member directly into the middle of the object\nwhich makes it incidentally overlap with SLUB\u0027s freelist pointer.\nThat, in combination with SLAB_FREELIST_HARDENED\u0027s freelist pointer\nmangling, leads to a reliable access violation in form of a #GP which\nmade the UAF fail fast.\n\nMichal seems to have run into the same issue[1]. He already correctly\ndiagnosed that commit a7b359fc6a37 (\"sched/fair: Correctly insert\ncfs_rq\u0027s to list on unthrottle\") is causing the preconditions for the\nUAF to happen by re-adding cfs_rq\u0027s also to task groups that have no\nmore running tasks, i.e. also to dead ones. His analysis, however,\nmisses the real root cause and it cannot be seen from the crash\nbacktrace only, as the real offender is tg_unthrottle_up() getting\ncalled via sched_cfs_period_timer() via the timer interrupt at an\ninconvenient time.\n\nWhen unregister_fair_sched_group() unlinks all cfs_rq\u0027s from the dying\ntask group, it doesn\u0027t protect itself from getting interrupted. If the\ntimer interrupt triggers while we iterate over all CPUs or after\nunregister_fair_sched_group() has finished but prior to unlinking the\ntask group, sched_cfs_period_timer() will execute and walk the list of\ntask groups, trying to unthrottle cfs_rq\u0027s, i.e. re-add them to the\ndying task group. These will later -- in free_fair_sched_group() -- be\nkfree()\u0027ed while still being linked, leading to the fireworks Kevin\nand Michal are seeing.\n\nTo fix this race, ensure the dying task group gets unlinked first.\nHowever, simply switching the order of unregistering and unlinking the\ntask group isn\u0027t sufficient, as concurrent RCU walkers might still see\nit, as can be seen below:\n\n    CPU1:                                      CPU2:\n      :                                        timer IRQ:\n      :                                          do_sched_cfs_period_timer():\n      :                                            :\n      :                                            distribute_cfs_runtime():\n      :                                              rcu_read_lock();\n      :                                              :\n      :                                              unthrottle_cfs_rq():\n    sched_offline_group():                             :\n      :                                                walk_tg_tree_from(\u2026,tg_unthrottle_up,\u2026):\n      list_del_rcu(\u0026tg-\u003elist);                           :\n (1)  :                                                  list_for_each_entry_rcu(child, \u0026parent-\u003echildren, siblings)\n      :                                                    :\n (2)  list_del_rcu(\u0026tg-\u003esiblings);                         :\n      :                                                    tg_unthrottle_up():\n      unregister_fair_sched_group():                         struct cfs_rq *cfs_rq = tg-\u003ecfs_rq[cpu_of(rq)];\n        :                                                    :\n        list_del_leaf_cfs_rq(tg-\u003ecfs_rq[cpu]);               :\n        :                                                    :\n        :                                                    if (!cfs_rq_is_decayed(cfs_rq) || cfs_rq-\u003enr_running)\n (3)    :                                                        list_add_leaf_cfs_rq(cfs_rq);\n      :                                                      :\n      :                                                    :\n      :                                                  :\n      :                                                :\n      :                           \n---truncated---",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47209",
          "url": "https://www.suse.com/security/cve/CVE-2021-47209"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222796 for CVE-2021-47209",
          "url": "https://bugzilla.suse.com/1222796"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T09:29:37Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47209"
    },
    {
      "cve": "CVE-2021-47210",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47210"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: typec: tipd: Remove WARN_ON in tps6598x_block_read\n\nCalling tps6598x_block_read with a higher than allowed len can be\nhandled by just returning an error. There\u0027s no need to crash systems\nwith panic-on-warn enabled.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47210",
          "url": "https://www.suse.com/security/cve/CVE-2021-47210"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222901 for CVE-2021-47210",
          "url": "https://bugzilla.suse.com/1222901"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T09:29:37Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47210"
    },
    {
      "cve": "CVE-2021-47211",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47211"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: usb-audio: fix null pointer dereference on pointer cs_desc\n\nThe pointer cs_desc return from snd_usb_find_clock_source could\nbe null, so there is a potential null pointer dereference issue.\nFix this by adding a null check before dereference.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47211",
          "url": "https://www.suse.com/security/cve/CVE-2021-47211"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222869 for CVE-2021-47211",
          "url": "https://bugzilla.suse.com/1222869"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T09:29:37Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47211"
    },
    {
      "cve": "CVE-2021-47212",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47212"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/mlx5: Update error handler for UCTX and UMEM\n\nIn the fast unload flow, the device state is set to internal error,\nwhich indicates that the driver started the destroy process.\nIn this case, when a destroy command is being executed, it should return\nMLX5_CMD_STAT_OK.\nFix MLX5_CMD_OP_DESTROY_UCTX and MLX5_CMD_OP_DESTROY_UMEM to return OK\ninstead of EIO.\n\nThis fixes a call trace in the umem release process -\n[ 2633.536695] Call Trace:\n[ 2633.537518]  ib_uverbs_remove_one+0xc3/0x140 [ib_uverbs]\n[ 2633.538596]  remove_client_context+0x8b/0xd0 [ib_core]\n[ 2633.539641]  disable_device+0x8c/0x130 [ib_core]\n[ 2633.540615]  __ib_unregister_device+0x35/0xa0 [ib_core]\n[ 2633.541640]  ib_unregister_device+0x21/0x30 [ib_core]\n[ 2633.542663]  __mlx5_ib_remove+0x38/0x90 [mlx5_ib]\n[ 2633.543640]  auxiliary_bus_remove+0x1e/0x30 [auxiliary]\n[ 2633.544661]  device_release_driver_internal+0x103/0x1f0\n[ 2633.545679]  bus_remove_device+0xf7/0x170\n[ 2633.546640]  device_del+0x181/0x410\n[ 2633.547606]  mlx5_rescan_drivers_locked.part.10+0x63/0x160 [mlx5_core]\n[ 2633.548777]  mlx5_unregister_device+0x27/0x40 [mlx5_core]\n[ 2633.549841]  mlx5_uninit_one+0x21/0xc0 [mlx5_core]\n[ 2633.550864]  remove_one+0x69/0xe0 [mlx5_core]\n[ 2633.551819]  pci_device_remove+0x3b/0xc0\n[ 2633.552731]  device_release_driver_internal+0x103/0x1f0\n[ 2633.553746]  unbind_store+0xf6/0x130\n[ 2633.554657]  kernfs_fop_write+0x116/0x190\n[ 2633.555567]  vfs_write+0xa5/0x1a0\n[ 2633.556407]  ksys_write+0x4f/0xb0\n[ 2633.557233]  do_syscall_64+0x5b/0x1a0\n[ 2633.558071]  entry_SYSCALL_64_after_hwframe+0x65/0xca\n[ 2633.559018] RIP: 0033:0x7f9977132648\n[ 2633.559821] Code: 89 02 48 c7 c0 ff ff ff ff eb b3 0f 1f 80 00 00 00 00 f3 0f 1e fa 48 8d 05 55 6f 2d 00 8b 00 85 c0 75 17 b8 01 00 00 00 0f 05 \u003c48\u003e 3d 00 f0 ff ff 77 58 c3 0f 1f 80 00 00 00 00 41 54 49 89 d4 55\n[ 2633.562332] RSP: 002b:00007fffb1a83888 EFLAGS: 00000246 ORIG_RAX: 0000000000000001\n[ 2633.563472] RAX: ffffffffffffffda RBX: 000000000000000c RCX: 00007f9977132648\n[ 2633.564541] RDX: 000000000000000c RSI: 000055b90546e230 RDI: 0000000000000001\n[ 2633.565596] RBP: 000055b90546e230 R08: 00007f9977406860 R09: 00007f9977a54740\n[ 2633.566653] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f99774056e0\n[ 2633.567692] R13: 000000000000000c R14: 00007f9977400880 R15: 000000000000000c\n[ 2633.568725] ---[ end trace 10b4fe52945e544d ]---",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47212",
          "url": "https://www.suse.com/security/cve/CVE-2021-47212"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222709 for CVE-2021-47212",
          "url": "https://bugzilla.suse.com/1222709"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T09:29:37Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47212"
    },
    {
      "cve": "CVE-2021-47214",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47214"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nhugetlb, userfaultfd: fix reservation restore on userfaultfd error\n\nCurrently in the is_continue case in hugetlb_mcopy_atomic_pte(), if we\nbail out using \"goto out_release_unlock;\" in the cases where idx \u003e=\nsize, or !huge_pte_none(), the code will detect that new_pagecache_page\n== false, and so call restore_reserve_on_error().  In this case I see\nrestore_reserve_on_error() delete the reservation, and the following\ncall to remove_inode_hugepages() will increment h-\u003eresv_hugepages\ncausing a 100% reproducible leak.\n\nWe should treat the is_continue case similar to adding a page into the\npagecache and set new_pagecache_page to true, to indicate that there is\nno reservation to restore on the error path, and we need not call\nrestore_reserve_on_error().  Rename new_pagecache_page to\npage_in_pagecache to make that clear.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47214",
          "url": "https://www.suse.com/security/cve/CVE-2021-47214"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222710 for CVE-2021-47214",
          "url": "https://bugzilla.suse.com/1222710"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T09:29:37Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47214"
    },
    {
      "cve": "CVE-2021-47215",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47215"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/mlx5e: kTLS, Fix crash in RX resync flow\n\nFor the TLS RX resync flow, we maintain a list of TLS contexts\nthat require some attention, to communicate their resync information\nto the HW.\nHere we fix list corruptions, by protecting the entries against\nmovements coming from resync_handle_seq_match(), until their resync\nhandling in napi is fully completed.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47215",
          "url": "https://www.suse.com/security/cve/CVE-2021-47215"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222704 for CVE-2021-47215",
          "url": "https://bugzilla.suse.com/1222704"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T09:29:37Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47215"
    },
    {
      "cve": "CVE-2021-47216",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47216"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: advansys: Fix kernel pointer leak\n\nPointers should be printed with %p or %px rather than cast to \u0027unsigned\nlong\u0027 and printed with %lx.\n\nChange %lx to %p to print the hashed pointer.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47216",
          "url": "https://www.suse.com/security/cve/CVE-2021-47216"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222876 for CVE-2021-47216",
          "url": "https://bugzilla.suse.com/1222876"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T09:29:37Z",
          "details": "low"
        }
      ],
      "title": "CVE-2021-47216"
    },
    {
      "cve": "CVE-2021-47217",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47217"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nx86/hyperv: Fix NULL deref in set_hv_tscchange_cb() if Hyper-V setup fails\n\nCheck for a valid hv_vp_index array prior to derefencing hv_vp_index when\nsetting Hyper-V\u0027s TSC change callback.  If Hyper-V setup failed in\nhyperv_init(), the kernel will still report that it\u0027s running under\nHyper-V, but will have silently disabled nearly all functionality.\n\n  BUG: kernel NULL pointer dereference, address: 0000000000000010\n  #PF: supervisor read access in kernel mode\n  #PF: error_code(0x0000) - not-present page\n  PGD 0 P4D 0\n  Oops: 0000 [#1] SMP\n  CPU: 4 PID: 1 Comm: swapper/0 Not tainted 5.15.0-rc2+ #75\n  Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 0.0.0 02/06/2015\n  RIP: 0010:set_hv_tscchange_cb+0x15/0xa0\n  Code: \u003c8b\u003e 04 82 8b 15 12 17 85 01 48 c1 e0 20 48 0d ee 00 01 00 f6 c6 08\n  ...\n  Call Trace:\n   kvm_arch_init+0x17c/0x280\n   kvm_init+0x31/0x330\n   vmx_init+0xba/0x13a\n   do_one_initcall+0x41/0x1c0\n   kernel_init_freeable+0x1f2/0x23b\n   kernel_init+0x16/0x120\n   ret_from_fork+0x22/0x30",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47217",
          "url": "https://www.suse.com/security/cve/CVE-2021-47217"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222836 for CVE-2021-47217",
          "url": "https://bugzilla.suse.com/1222836"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T09:29:37Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47217"
    },
    {
      "cve": "CVE-2021-47218",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47218"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nselinux: fix NULL-pointer dereference when hashtab allocation fails\n\nWhen the hash table slot array allocation fails in hashtab_init(),\nh-\u003esize is left initialized with a non-zero value, but the h-\u003ehtable\npointer is NULL. This may then cause a NULL pointer dereference, since\nthe policydb code relies on the assumption that even after a failed\nhashtab_init(), hashtab_map() and hashtab_destroy() can be safely called\non it. Yet, these detect an empty hashtab only by looking at the size.\n\nFix this by making sure that hashtab_init() always leaves behind a valid\nempty hashtab when the allocation fails.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47218",
          "url": "https://www.suse.com/security/cve/CVE-2021-47218"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222791 for CVE-2021-47218",
          "url": "https://bugzilla.suse.com/1222791"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T09:29:37Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47218"
    },
    {
      "cve": "CVE-2021-47219",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47219"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: scsi_debug: Fix out-of-bound read in resp_report_tgtpgs()\n\nThe following issue was observed running syzkaller:\n\nBUG: KASAN: slab-out-of-bounds in memcpy include/linux/string.h:377 [inline]\nBUG: KASAN: slab-out-of-bounds in sg_copy_buffer+0x150/0x1c0 lib/scatterlist.c:831\nRead of size 2132 at addr ffff8880aea95dc8 by task syz-executor.0/9815\n\nCPU: 0 PID: 9815 Comm: syz-executor.0 Not tainted 4.19.202-00874-gfc0fe04215a9 #2\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.10.2-1ubuntu1 04/01/2014\nCall Trace:\n __dump_stack lib/dump_stack.c:77 [inline]\n dump_stack+0xe4/0x14a lib/dump_stack.c:118\n print_address_description+0x73/0x280 mm/kasan/report.c:253\n kasan_report_error mm/kasan/report.c:352 [inline]\n kasan_report+0x272/0x370 mm/kasan/report.c:410\n memcpy+0x1f/0x50 mm/kasan/kasan.c:302\n memcpy include/linux/string.h:377 [inline]\n sg_copy_buffer+0x150/0x1c0 lib/scatterlist.c:831\n fill_from_dev_buffer+0x14f/0x340 drivers/scsi/scsi_debug.c:1021\n resp_report_tgtpgs+0x5aa/0x770 drivers/scsi/scsi_debug.c:1772\n schedule_resp+0x464/0x12f0 drivers/scsi/scsi_debug.c:4429\n scsi_debug_queuecommand+0x467/0x1390 drivers/scsi/scsi_debug.c:5835\n scsi_dispatch_cmd+0x3fc/0x9b0 drivers/scsi/scsi_lib.c:1896\n scsi_request_fn+0x1042/0x1810 drivers/scsi/scsi_lib.c:2034\n __blk_run_queue_uncond block/blk-core.c:464 [inline]\n __blk_run_queue+0x1a4/0x380 block/blk-core.c:484\n blk_execute_rq_nowait+0x1c2/0x2d0 block/blk-exec.c:78\n sg_common_write.isra.19+0xd74/0x1dc0 drivers/scsi/sg.c:847\n sg_write.part.23+0x6e0/0xd00 drivers/scsi/sg.c:716\n sg_write+0x64/0xa0 drivers/scsi/sg.c:622\n __vfs_write+0xed/0x690 fs/read_write.c:485\nkill_bdev:block_device:00000000e138492c\n vfs_write+0x184/0x4c0 fs/read_write.c:549\n ksys_write+0x107/0x240 fs/read_write.c:599\n do_syscall_64+0xc2/0x560 arch/x86/entry/common.c:293\n entry_SYSCALL_64_after_hwframe+0x49/0xbe\n\nWe get \u0027alen\u0027 from command its type is int. If userspace passes a large\nlength we will get a negative \u0027alen\u0027.\n\nSwitch n, alen, and rlen to u32.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47219",
          "url": "https://www.suse.com/security/cve/CVE-2021-47219"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222824 for CVE-2021-47219",
          "url": "https://bugzilla.suse.com/1222824"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T09:29:37Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47219"
    },
    {
      "cve": "CVE-2022-48631",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-48631"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\next4: fix bug in extents parsing when eh_entries == 0 and eh_depth \u003e 0\n\nWhen walking through an inode extents, the ext4_ext_binsearch_idx() function\nassumes that the extent header has been previously validated.  However, there\nare no checks that verify that the number of entries (eh-\u003eeh_entries) is\nnon-zero when depth is \u003e 0.  And this will lead to problems because the\nEXT_FIRST_INDEX() and EXT_LAST_INDEX() will return garbage and result in this:\n\n[  135.245946] ------------[ cut here ]------------\n[  135.247579] kernel BUG at fs/ext4/extents.c:2258!\n[  135.249045] invalid opcode: 0000 [#1] PREEMPT SMP\n[  135.250320] CPU: 2 PID: 238 Comm: tmp118 Not tainted 5.19.0-rc8+ #4\n[  135.252067] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.15.0-0-g2dd4b9b-rebuilt.opensuse.org 04/01/2014\n[  135.255065] RIP: 0010:ext4_ext_map_blocks+0xc20/0xcb0\n[  135.256475] Code:\n[  135.261433] RSP: 0018:ffffc900005939f8 EFLAGS: 00010246\n[  135.262847] RAX: 0000000000000024 RBX: ffffc90000593b70 RCX: 0000000000000023\n[  135.264765] RDX: ffff8880038e5f10 RSI: 0000000000000003 RDI: ffff8880046e922c\n[  135.266670] RBP: ffff8880046e9348 R08: 0000000000000001 R09: ffff888002ca580c\n[  135.268576] R10: 0000000000002602 R11: 0000000000000000 R12: 0000000000000024\n[  135.270477] R13: 0000000000000000 R14: 0000000000000024 R15: 0000000000000000\n[  135.272394] FS:  00007fdabdc56740(0000) GS:ffff88807dd00000(0000) knlGS:0000000000000000\n[  135.274510] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[  135.276075] CR2: 00007ffc26bd4f00 CR3: 0000000006261004 CR4: 0000000000170ea0\n[  135.277952] Call Trace:\n[  135.278635]  \u003cTASK\u003e\n[  135.279247]  ? preempt_count_add+0x6d/0xa0\n[  135.280358]  ? percpu_counter_add_batch+0x55/0xb0\n[  135.281612]  ? _raw_read_unlock+0x18/0x30\n[  135.282704]  ext4_map_blocks+0x294/0x5a0\n[  135.283745]  ? xa_load+0x6f/0xa0\n[  135.284562]  ext4_mpage_readpages+0x3d6/0x770\n[  135.285646]  read_pages+0x67/0x1d0\n[  135.286492]  ? folio_add_lru+0x51/0x80\n[  135.287441]  page_cache_ra_unbounded+0x124/0x170\n[  135.288510]  filemap_get_pages+0x23d/0x5a0\n[  135.289457]  ? path_openat+0xa72/0xdd0\n[  135.290332]  filemap_read+0xbf/0x300\n[  135.291158]  ? _raw_spin_lock_irqsave+0x17/0x40\n[  135.292192]  new_sync_read+0x103/0x170\n[  135.293014]  vfs_read+0x15d/0x180\n[  135.293745]  ksys_read+0xa1/0xe0\n[  135.294461]  do_syscall_64+0x3c/0x80\n[  135.295284]  entry_SYSCALL_64_after_hwframe+0x46/0xb0\n\nThis patch simply adds an extra check in __ext4_ext_check(), verifying that\neh_entries is not 0 when eh_depth is \u003e 0.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-48631",
          "url": "https://www.suse.com/security/cve/CVE-2022-48631"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223475 for CVE-2022-48631",
          "url": "https://bugzilla.suse.com/1223475"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T09:29:37Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-48631"
    },
    {
      "cve": "CVE-2022-48632",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-48632"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ni2c: mlxbf: prevent stack overflow in mlxbf_i2c_smbus_start_transaction()\n\nmemcpy() is called in a loop while \u0027operation-\u003elength\u0027 upper bound\nis not checked and \u0027data_idx\u0027 also increments.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-48632",
          "url": "https://www.suse.com/security/cve/CVE-2022-48632"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223481 for CVE-2022-48632",
          "url": "https://bugzilla.suse.com/1223481"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T09:29:37Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-48632"
    },
    {
      "cve": "CVE-2022-48634",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-48634"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/gma500: Fix BUG: sleeping function called from invalid context errors\n\ngma_crtc_page_flip() was holding the event_lock spinlock while calling\ncrtc_funcs-\u003emode_set_base() which takes ww_mutex.\n\nThe only reason to hold event_lock is to clear gma_crtc-\u003epage_flip_event\non mode_set_base() errors.\n\nInstead unlock it after setting gma_crtc-\u003epage_flip_event and on\nerrors re-take the lock and clear gma_crtc-\u003epage_flip_event it\nit is still set.\n\nThis fixes the following WARN/stacktrace:\n\n[  512.122953] BUG: sleeping function called from invalid context at kernel/locking/mutex.c:870\n[  512.123004] in_atomic(): 1, irqs_disabled(): 1, non_block: 0, pid: 1253, name: gnome-shell\n[  512.123031] preempt_count: 1, expected: 0\n[  512.123048] RCU nest depth: 0, expected: 0\n[  512.123066] INFO: lockdep is turned off.\n[  512.123080] irq event stamp: 0\n[  512.123094] hardirqs last  enabled at (0): [\u003c0000000000000000\u003e] 0x0\n[  512.123134] hardirqs last disabled at (0): [\u003cffffffff8d0ec28c\u003e] copy_process+0x9fc/0x1de0\n[  512.123176] softirqs last  enabled at (0): [\u003cffffffff8d0ec28c\u003e] copy_process+0x9fc/0x1de0\n[  512.123207] softirqs last disabled at (0): [\u003c0000000000000000\u003e] 0x0\n[  512.123233] Preemption disabled at:\n[  512.123241] [\u003c0000000000000000\u003e] 0x0\n[  512.123275] CPU: 3 PID: 1253 Comm: gnome-shell Tainted: G        W         5.19.0+ #1\n[  512.123304] Hardware name: Packard Bell dot s/SJE01_CT, BIOS V1.10 07/23/2013\n[  512.123323] Call Trace:\n[  512.123346]  \u003cTASK\u003e\n[  512.123370]  dump_stack_lvl+0x5b/0x77\n[  512.123412]  __might_resched.cold+0xff/0x13a\n[  512.123458]  ww_mutex_lock+0x1e/0xa0\n[  512.123495]  psb_gem_pin+0x2c/0x150 [gma500_gfx]\n[  512.123601]  gma_pipe_set_base+0x76/0x240 [gma500_gfx]\n[  512.123708]  gma_crtc_page_flip+0x95/0x130 [gma500_gfx]\n[  512.123808]  drm_mode_page_flip_ioctl+0x57d/0x5d0\n[  512.123897]  ? drm_mode_cursor2_ioctl+0x10/0x10\n[  512.123936]  drm_ioctl_kernel+0xa1/0x150\n[  512.123984]  drm_ioctl+0x21f/0x420\n[  512.124025]  ? drm_mode_cursor2_ioctl+0x10/0x10\n[  512.124070]  ? rcu_read_lock_bh_held+0xb/0x60\n[  512.124104]  ? lock_release+0x1ef/0x2d0\n[  512.124161]  __x64_sys_ioctl+0x8d/0xd0\n[  512.124203]  do_syscall_64+0x58/0x80\n[  512.124239]  ? do_syscall_64+0x67/0x80\n[  512.124267]  ? trace_hardirqs_on_prepare+0x55/0xe0\n[  512.124300]  ? do_syscall_64+0x67/0x80\n[  512.124340]  ? rcu_read_lock_sched_held+0x10/0x80\n[  512.124377]  entry_SYSCALL_64_after_hwframe+0x63/0xcd\n[  512.124411] RIP: 0033:0x7fcc4a70740f\n[  512.124442] Code: 00 48 89 44 24 18 31 c0 48 8d 44 24 60 c7 04 24 10 00 00 00 48 89 44 24 08 48 8d 44 24 20 48 89 44 24 10 b8 10 00 00 00 0f 05 \u003c89\u003e c2 3d 00 f0 ff ff 77 18 48 8b 44 24 18 64 48 2b 04 25 28 00 00\n[  512.124470] RSP: 002b:00007ffda73f5390 EFLAGS: 00000246 ORIG_RAX: 0000000000000010\n[  512.124503] RAX: ffffffffffffffda RBX: 000055cc9e474500 RCX: 00007fcc4a70740f\n[  512.124524] RDX: 00007ffda73f5420 RSI: 00000000c01864b0 RDI: 0000000000000009\n[  512.124544] RBP: 00007ffda73f5420 R08: 000055cc9c0b0cb0 R09: 0000000000000034\n[  512.124564] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000c01864b0\n[  512.124584] R13: 0000000000000009 R14: 000055cc9df484d0 R15: 000055cc9af5d0c0\n[  512.124647]  \u003c/TASK\u003e",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-48634",
          "url": "https://www.suse.com/security/cve/CVE-2022-48634"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223501 for CVE-2022-48634",
          "url": "https://bugzilla.suse.com/1223501"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T09:29:37Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-48634"
    },
    {
      "cve": "CVE-2022-48636",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-48636"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ns390/dasd: fix Oops in dasd_alias_get_start_dev due to missing pavgroup\n\nFix Oops in dasd_alias_get_start_dev() function caused by the pavgroup\npointer being NULL.\n\nThe pavgroup pointer is checked on the entrance of the function but\nwithout the lcu-\u003elock being held. Therefore there is a race window\nbetween dasd_alias_get_start_dev() and _lcu_update() which sets\npavgroup to NULL with the lcu-\u003elock held.\n\nFix by checking the pavgroup pointer with lcu-\u003elock held.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-48636",
          "url": "https://www.suse.com/security/cve/CVE-2022-48636"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223512 for CVE-2022-48636",
          "url": "https://bugzilla.suse.com/1223512"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T09:29:37Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-48636"
    },
    {
      "cve": "CVE-2022-48637",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-48637"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbnxt: prevent skb UAF after handing over to PTP worker\n\nWhen reading the timestamp is required bnxt_tx_int() hands\nover the ownership of the completed skb to the PTP worker.\nThe skb should not be used afterwards, as the worker may\nrun before the rest of our code and free the skb, leading\nto a use-after-free.\n\nSince dev_kfree_skb_any() accepts NULL make the loss of\nownership more obvious and set skb to NULL.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-48637",
          "url": "https://www.suse.com/security/cve/CVE-2022-48637"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223517 for CVE-2022-48637",
          "url": "https://bugzilla.suse.com/1223517"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T09:29:37Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-48637"
    },
    {
      "cve": "CVE-2022-48638",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-48638"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncgroup: cgroup_get_from_id() must check the looked-up kn is a directory\n\ncgroup has to be one kernfs dir, otherwise kernel panic is caused,\nespecially cgroup id is provide from userspace.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-48638",
          "url": "https://www.suse.com/security/cve/CVE-2022-48638"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223522 for CVE-2022-48638",
          "url": "https://bugzilla.suse.com/1223522"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T09:29:37Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-48638"
    },
    {
      "cve": "CVE-2022-48639",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-48639"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: sched: fix possible refcount leak in tc_new_tfilter()\n\ntfilter_put need to be called to put the refount got by tp-\u003eops-\u003eget to\navoid possible refcount leak when chain-\u003etmplt_ops != NULL and\nchain-\u003etmplt_ops != tp-\u003eops.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-48639",
          "url": "https://www.suse.com/security/cve/CVE-2022-48639"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223490 for CVE-2022-48639",
          "url": "https://bugzilla.suse.com/1223490"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T09:29:37Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-48639"
    },
    {
      "cve": "CVE-2022-48640",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-48640"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbonding: fix NULL deref in bond_rr_gen_slave_id\n\nFix a NULL dereference of the struct bonding.rr_tx_counter member because\nif a bond is initially created with an initial mode != zero (Round Robin)\nthe memory required for the counter is never created and when the mode is\nchanged there is never any attempt to verify the memory is allocated upon\nswitching modes.\n\nThis causes the following Oops on an aarch64 machine:\n    [  334.686773] Unable to handle kernel paging request at virtual address ffff2c91ac905000\n    [  334.694703] Mem abort info:\n    [  334.697486]   ESR = 0x0000000096000004\n    [  334.701234]   EC = 0x25: DABT (current EL), IL = 32 bits\n    [  334.706536]   SET = 0, FnV = 0\n    [  334.709579]   EA = 0, S1PTW = 0\n    [  334.712719]   FSC = 0x04: level 0 translation fault\n    [  334.717586] Data abort info:\n    [  334.720454]   ISV = 0, ISS = 0x00000004\n    [  334.724288]   CM = 0, WnR = 0\n    [  334.727244] swapper pgtable: 4k pages, 48-bit VAs, pgdp=000008044d662000\n    [  334.733944] [ffff2c91ac905000] pgd=0000000000000000, p4d=0000000000000000\n    [  334.740734] Internal error: Oops: 96000004 [#1] SMP\n    [  334.745602] Modules linked in: bonding tls veth rfkill sunrpc arm_spe_pmu vfat fat acpi_ipmi ipmi_ssif ixgbe igb i40e mdio ipmi_devintf ipmi_msghandler arm_cmn arm_dsu_pmu cppc_cpufreq acpi_tad fuse zram crct10dif_ce ast ghash_ce sbsa_gwdt nvme drm_vram_helper drm_ttm_helper nvme_core ttm xgene_hwmon\n    [  334.772217] CPU: 7 PID: 2214 Comm: ping Not tainted 6.0.0-rc4-00133-g64ae13ed4784 #4\n    [  334.779950] Hardware name: GIGABYTE R272-P31-00/MP32-AR1-00, BIOS F18v (SCP: 1.08.20211002) 12/01/2021\n    [  334.789244] pstate: 60400009 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)\n    [  334.796196] pc : bond_rr_gen_slave_id+0x40/0x124 [bonding]\n    [  334.801691] lr : bond_xmit_roundrobin_slave_get+0x38/0xdc [bonding]\n    [  334.807962] sp : ffff8000221733e0\n    [  334.811265] x29: ffff8000221733e0 x28: ffffdbac8572d198 x27: ffff80002217357c\n    [  334.818392] x26: 000000000000002a x25: ffffdbacb33ee000 x24: ffff07ff980fa000\n    [  334.825519] x23: ffffdbacb2e398ba x22: ffff07ff98102000 x21: ffff07ff981029c0\n    [  334.832646] x20: 0000000000000001 x19: ffff07ff981029c0 x18: 0000000000000014\n    [  334.839773] x17: 0000000000000000 x16: ffffdbacb1004364 x15: 0000aaaabe2f5a62\n    [  334.846899] x14: ffff07ff8e55d968 x13: ffff07ff8e55db30 x12: 0000000000000000\n    [  334.854026] x11: ffffdbacb21532e8 x10: 0000000000000001 x9 : ffffdbac857178ec\n    [  334.861153] x8 : ffff07ff9f6e5a28 x7 : 0000000000000000 x6 : 000000007c2b3742\n    [  334.868279] x5 : ffff2c91ac905000 x4 : ffff2c91ac905000 x3 : ffff07ff9f554400\n    [  334.875406] x2 : ffff2c91ac905000 x1 : 0000000000000001 x0 : ffff07ff981029c0\n    [  334.882532] Call trace:\n    [  334.884967]  bond_rr_gen_slave_id+0x40/0x124 [bonding]\n    [  334.890109]  bond_xmit_roundrobin_slave_get+0x38/0xdc [bonding]\n    [  334.896033]  __bond_start_xmit+0x128/0x3a0 [bonding]\n    [  334.901001]  bond_start_xmit+0x54/0xb0 [bonding]\n    [  334.905622]  dev_hard_start_xmit+0xb4/0x220\n    [  334.909798]  __dev_queue_xmit+0x1a0/0x720\n    [  334.913799]  arp_xmit+0x3c/0xbc\n    [  334.916932]  arp_send_dst+0x98/0xd0\n    [  334.920410]  arp_solicit+0xe8/0x230\n    [  334.923888]  neigh_probe+0x60/0xb0\n    [  334.927279]  __neigh_event_send+0x3b0/0x470\n    [  334.931453]  neigh_resolve_output+0x70/0x90\n    [  334.935626]  ip_finish_output2+0x158/0x514\n    [  334.939714]  __ip_finish_output+0xac/0x1a4\n    [  334.943800]  ip_finish_output+0x40/0xfc\n    [  334.947626]  ip_output+0xf8/0x1a4\n    [  334.950931]  ip_send_skb+0x5c/0x100\n    [  334.954410]  ip_push_pending_frames+0x3c/0x60\n    [  334.958758]  raw_sendmsg+0x458/0x6d0\n    [  334.962325]  inet_sendmsg+0x50/0x80\n    [  334.965805]  sock_sendmsg+0x60/0x6c\n    [  334.969286]  __sys_sendto+0xc8/0x134\n    [  334.972853]  __arm64_sys_sendto+0x34/0x4c\n---truncated---",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-48640",
          "url": "https://www.suse.com/security/cve/CVE-2022-48640"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223499 for CVE-2022-48640",
          "url": "https://bugzilla.suse.com/1223499"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T09:29:37Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-48640"
    },
    {
      "cve": "CVE-2022-48642",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-48642"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nf_tables: fix percpu memory leak at nf_tables_addchain()\n\nIt seems to me that percpu memory for chain stats started leaking since\ncommit 3bc158f8d0330f0a (\"netfilter: nf_tables: map basechain priority to\nhardware priority\") when nft_chain_offload_priority() returned an error.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-48642",
          "url": "https://www.suse.com/security/cve/CVE-2022-48642"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223478 for CVE-2022-48642",
          "url": "https://bugzilla.suse.com/1223478"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T09:29:37Z",
          "details": "low"
        }
      ],
      "title": "CVE-2022-48642"
    },
    {
      "cve": "CVE-2022-48644",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-48644"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/sched: taprio: avoid disabling offload when it was never enabled\n\nIn an incredibly strange API design decision, qdisc-\u003edestroy() gets\ncalled even if qdisc-\u003einit() never succeeded, not exclusively since\ncommit 87b60cfacf9f (\"net_sched: fix error recovery at qdisc creation\"),\nbut apparently also earlier (in the case of qdisc_create_dflt()).\n\nThe taprio qdisc does not fully acknowledge this when it attempts full\noffload, because it starts off with q-\u003eflags = TAPRIO_FLAGS_INVALID in\ntaprio_init(), then it replaces q-\u003eflags with TCA_TAPRIO_ATTR_FLAGS\nparsed from netlink (in taprio_change(), tail called from taprio_init()).\n\nBut in taprio_destroy(), we call taprio_disable_offload(), and this\ndetermines what to do based on FULL_OFFLOAD_IS_ENABLED(q-\u003eflags).\n\nBut looking at the implementation of FULL_OFFLOAD_IS_ENABLED()\n(a bitwise check of bit 1 in q-\u003eflags), it is invalid to call this macro\non q-\u003eflags when it contains TAPRIO_FLAGS_INVALID, because that is set\nto U32_MAX, and therefore FULL_OFFLOAD_IS_ENABLED() will return true on\nan invalid set of flags.\n\nAs a result, it is possible to crash the kernel if user space forces an\nerror between setting q-\u003eflags = TAPRIO_FLAGS_INVALID, and the calling\nof taprio_enable_offload(). This is because drivers do not expect the\noffload to be disabled when it was never enabled.\n\nThe error that we force here is to attach taprio as a non-root qdisc,\nbut instead as child of an mqprio root qdisc:\n\n$ tc qdisc add dev swp0 root handle 1: \\\n\tmqprio num_tc 8 map 0 1 2 3 4 5 6 7 \\\n\tqueues 1@0 1@1 1@2 1@3 1@4 1@5 1@6 1@7 hw 0\n$ tc qdisc replace dev swp0 parent 1:1 \\\n\ttaprio num_tc 8 map 0 1 2 3 4 5 6 7 \\\n\tqueues 1@0 1@1 1@2 1@3 1@4 1@5 1@6 1@7 base-time 0 \\\n\tsched-entry S 0x7f 990000 sched-entry S 0x80 100000 \\\n\tflags 0x0 clockid CLOCK_TAI\nUnable to handle kernel paging request at virtual address fffffffffffffff8\n[fffffffffffffff8] pgd=0000000000000000, p4d=0000000000000000\nInternal error: Oops: 96000004 [#1] PREEMPT SMP\nCall trace:\n taprio_dump+0x27c/0x310\n vsc9959_port_setup_tc+0x1f4/0x460\n felix_port_setup_tc+0x24/0x3c\n dsa_slave_setup_tc+0x54/0x27c\n taprio_disable_offload.isra.0+0x58/0xe0\n taprio_destroy+0x80/0x104\n qdisc_create+0x240/0x470\n tc_modify_qdisc+0x1fc/0x6b0\n rtnetlink_rcv_msg+0x12c/0x390\n netlink_rcv_skb+0x5c/0x130\n rtnetlink_rcv+0x1c/0x2c\n\nFix this by keeping track of the operations we made, and undo the\noffload only if we actually did it.\n\nI\u0027ve added \"bool offloaded\" inside a 4 byte hole between \"int clockid\"\nand \"atomic64_t picos_per_byte\". Now the first cache line looks like\nbelow:\n\n$ pahole -C taprio_sched net/sched/sch_taprio.o\nstruct taprio_sched {\n        struct Qdisc * *           qdiscs;               /*     0     8 */\n        struct Qdisc *             root;                 /*     8     8 */\n        u32                        flags;                /*    16     4 */\n        enum tk_offsets            tk_offset;            /*    20     4 */\n        int                        clockid;              /*    24     4 */\n        bool                       offloaded;            /*    28     1 */\n\n        /* XXX 3 bytes hole, try to pack */\n\n        atomic64_t                 picos_per_byte;       /*    32     0 */\n\n        /* XXX 8 bytes hole, try to pack */\n\n        spinlock_t                 current_entry_lock;   /*    40     0 */\n\n        /* XXX 8 bytes hole, try to pack */\n\n        struct sched_entry *       current_entry;        /*    48     8 */\n        struct sched_gate_list *   oper_sched;           /*    56     8 */\n        /* --- cacheline 1 boundary (64 bytes) --- */",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-48644",
          "url": "https://www.suse.com/security/cve/CVE-2022-48644"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223511 for CVE-2022-48644",
          "url": "https://bugzilla.suse.com/1223511"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T09:29:37Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-48644"
    },
    {
      "cve": "CVE-2022-48646",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-48646"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsfc/siena: fix null pointer dereference in efx_hard_start_xmit\n\nLike in previous patch for sfc, prevent potential (but unlikely) NULL\npointer dereference.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-48646",
          "url": "https://www.suse.com/security/cve/CVE-2022-48646"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223502 for CVE-2022-48646",
          "url": "https://bugzilla.suse.com/1223502"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T09:29:37Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-48646"
    },
    {
      "cve": "CVE-2022-48647",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-48647"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsfc: fix TX channel offset when using legacy interrupts\n\nIn legacy interrupt mode the tx_channel_offset was hardcoded to 1, but\nthat\u0027s not correct if efx_sepparate_tx_channels is false. In that case,\nthe offset is 0 because the tx queues are in the single existing channel\nat index 0, together with the rx queue.\n\nWithout this fix, as soon as you try to send any traffic, it tries to\nget the tx queues from an uninitialized channel getting these errors:\n  WARNING: CPU: 1 PID: 0 at drivers/net/ethernet/sfc/tx.c:540 efx_hard_start_xmit+0x12e/0x170 [sfc]\n  [...]\n  RIP: 0010:efx_hard_start_xmit+0x12e/0x170 [sfc]\n  [...]\n  Call Trace:\n   \u003cIRQ\u003e\n   dev_hard_start_xmit+0xd7/0x230\n   sch_direct_xmit+0x9f/0x360\n   __dev_queue_xmit+0x890/0xa40\n  [...]\n  BUG: unable to handle kernel NULL pointer dereference at 0000000000000020\n  [...]\n  RIP: 0010:efx_hard_start_xmit+0x153/0x170 [sfc]\n  [...]\n  Call Trace:\n   \u003cIRQ\u003e\n   dev_hard_start_xmit+0xd7/0x230\n   sch_direct_xmit+0x9f/0x360\n   __dev_queue_xmit+0x890/0xa40\n  [...]",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-48647",
          "url": "https://www.suse.com/security/cve/CVE-2022-48647"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223519 for CVE-2022-48647",
          "url": "https://bugzilla.suse.com/1223519"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T09:29:37Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-48647"
    },
    {
      "cve": "CVE-2022-48648",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-48648"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsfc: fix null pointer dereference in efx_hard_start_xmit\n\nTrying to get the channel from the tx_queue variable here is wrong\nbecause we can only be here if tx_queue is NULL, so we shouldn\u0027t\ndereference it. As the above comment in the code says, this is very\nunlikely to happen, but it\u0027s wrong anyway so let\u0027s fix it.\n\nI hit this issue because of a different bug that caused tx_queue to be\nNULL. If that happens, this is the error message that we get here:\n  BUG: unable to handle kernel NULL pointer dereference at 0000000000000020\n  [...]\n  RIP: 0010:efx_hard_start_xmit+0x153/0x170 [sfc]",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-48648",
          "url": "https://www.suse.com/security/cve/CVE-2022-48648"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223503 for CVE-2022-48648",
          "url": "https://bugzilla.suse.com/1223503"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T09:29:37Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-48648"
    },
    {
      "cve": "CVE-2022-48650",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-48650"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: qla2xxx: Fix memory leak in __qlt_24xx_handle_abts()\n\nCommit 8f394da36a36 (\"scsi: qla2xxx: Drop TARGET_SCF_LOOKUP_LUN_FROM_TAG\")\nmade the __qlt_24xx_handle_abts() function return early if\ntcm_qla2xxx_find_cmd_by_tag() didn\u0027t find a command, but it missed to clean\nup the allocated memory for the management command.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-48650",
          "url": "https://www.suse.com/security/cve/CVE-2022-48650"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223509 for CVE-2022-48650",
          "url": "https://bugzilla.suse.com/1223509"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T09:29:37Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-48650"
    },
    {
      "cve": "CVE-2022-48651",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-48651"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipvlan: Fix out-of-bound bugs caused by unset skb-\u003emac_header\n\nIf an AF_PACKET socket is used to send packets through ipvlan and the\ndefault xmit function of the AF_PACKET socket is changed from\ndev_queue_xmit() to packet_direct_xmit() via setsockopt() with the option\nname of PACKET_QDISC_BYPASS, the skb-\u003emac_header may not be reset and\nremains as the initial value of 65535, this may trigger slab-out-of-bounds\nbugs as following:\n\n=================================================================\nUG: KASAN: slab-out-of-bounds in ipvlan_xmit_mode_l2+0xdb/0x330 [ipvlan]\nPU: 2 PID: 1768 Comm: raw_send Kdump: loaded Not tainted 6.0.0-rc4+ #6\nardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.14.0-1.fc33\nall Trace:\nprint_address_description.constprop.0+0x1d/0x160\nprint_report.cold+0x4f/0x112\nkasan_report+0xa3/0x130\nipvlan_xmit_mode_l2+0xdb/0x330 [ipvlan]\nipvlan_start_xmit+0x29/0xa0 [ipvlan]\n__dev_direct_xmit+0x2e2/0x380\npacket_direct_xmit+0x22/0x60\npacket_snd+0x7c9/0xc40\nsock_sendmsg+0x9a/0xa0\n__sys_sendto+0x18a/0x230\n__x64_sys_sendto+0x74/0x90\ndo_syscall_64+0x3b/0x90\nentry_SYSCALL_64_after_hwframe+0x63/0xcd\n\nThe root cause is:\n  1. packet_snd() only reset skb-\u003emac_header when sock-\u003etype is SOCK_RAW\n     and skb-\u003eprotocol is not specified as in packet_parse_headers()\n\n  2. packet_direct_xmit() doesn\u0027t reset skb-\u003emac_header as dev_queue_xmit()\n\nIn this case, skb-\u003emac_header is 65535 when ipvlan_xmit_mode_l2() is\ncalled. So when ipvlan_xmit_mode_l2() gets mac header with eth_hdr() which\nuse \"skb-\u003ehead + skb-\u003emac_header\", out-of-bound access occurs.\n\nThis patch replaces eth_hdr() with skb_eth_hdr() in ipvlan_xmit_mode_l2()\nand reset mac header in multicast to solve this out-of-bound bug.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-48651",
          "url": "https://www.suse.com/security/cve/CVE-2022-48651"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223513 for CVE-2022-48651",
          "url": "https://bugzilla.suse.com/1223513"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223514 for CVE-2022-48651",
          "url": "https://bugzilla.suse.com/1223514"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T09:29:37Z",
          "details": "important"
        }
      ],
      "title": "CVE-2022-48651"
    },
    {
      "cve": "CVE-2022-48652",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-48652"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nice: Fix crash by keep old cfg when update TCs more than queues\n\nThere are problems if allocated queues less than Traffic Classes.\n\nCommit a632b2a4c920 (\"ice: ethtool: Prohibit improper channel config\nfor DCB\") already disallow setting less queues than TCs.\n\nAnother case is if we first set less queues, and later update more TCs\nconfig due to LLDP, ice_vsi_cfg_tc() will failed but left dirty\nnum_txq/rxq and tc_cfg in vsi, that will cause invalid pointer access.\n\n[   95.968089] ice 0000:3b:00.1: More TCs defined than queues/rings allocated.\n[   95.968092] ice 0000:3b:00.1: Trying to use more Rx queues (8), than were allocated (1)!\n[   95.968093] ice 0000:3b:00.1: Failed to config TC for VSI index: 0\n[   95.969621] general protection fault: 0000 [#1] SMP NOPTI\n[   95.969705] CPU: 1 PID: 58405 Comm: lldpad Kdump: loaded Tainted: G     U  W  O     --------- -t - 4.18.0 #1\n[   95.969867] Hardware name: O.E.M/BC11SPSCB10, BIOS 8.23 12/30/2021\n[   95.969992] RIP: 0010:devm_kmalloc+0xa/0x60\n[   95.970052] Code: 5c ff ff ff 31 c0 5b 5d 41 5c c3 b8 f4 ff ff ff eb f4 0f 1f 40 00 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 89 d1 \u003c8b\u003e 97 60 02 00 00 48 8d 7e 18 48 39 f7 72 3f 55 89 ce 53 48 8b 4c\n[   95.970344] RSP: 0018:ffffc9003f553888 EFLAGS: 00010206\n[   95.970425] RAX: dead000000000200 RBX: ffffea003c425b00 RCX: 00000000006080c0\n[   95.970536] RDX: 00000000006080c0 RSI: 0000000000000200 RDI: dead000000000200\n[   95.970648] RBP: dead000000000200 R08: 00000000000463c0 R09: ffff888ffa900000\n[   95.970760] R10: 0000000000000000 R11: 0000000000000002 R12: ffff888ff6b40100\n[   95.970870] R13: ffff888ff6a55018 R14: 0000000000000000 R15: ffff888ff6a55460\n[   95.970981] FS:  00007f51b7d24700(0000) GS:ffff88903ee80000(0000) knlGS:0000000000000000\n[   95.971108] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[   95.971197] CR2: 00007fac5410d710 CR3: 0000000f2c1de002 CR4: 00000000007606e0\n[   95.971309] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n[   95.971419] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\n[   95.971530] PKRU: 55555554\n[   95.971573] Call Trace:\n[   95.971622]  ice_setup_rx_ring+0x39/0x110 [ice]\n[   95.971695]  ice_vsi_setup_rx_rings+0x54/0x90 [ice]\n[   95.971774]  ice_vsi_open+0x25/0x120 [ice]\n[   95.971843]  ice_open_internal+0xb8/0x1f0 [ice]\n[   95.971919]  ice_ena_vsi+0x4f/0xd0 [ice]\n[   95.971987]  ice_dcb_ena_dis_vsi.constprop.5+0x29/0x90 [ice]\n[   95.972082]  ice_pf_dcb_cfg+0x29a/0x380 [ice]\n[   95.972154]  ice_dcbnl_setets+0x174/0x1b0 [ice]\n[   95.972220]  dcbnl_ieee_set+0x89/0x230\n[   95.972279]  ? dcbnl_ieee_del+0x150/0x150\n[   95.972341]  dcb_doit+0x124/0x1b0\n[   95.972392]  rtnetlink_rcv_msg+0x243/0x2f0\n[   95.972457]  ? dcb_doit+0x14d/0x1b0\n[   95.972510]  ? __kmalloc_node_track_caller+0x1d3/0x280\n[   95.972591]  ? rtnl_calcit.isra.31+0x100/0x100\n[   95.972661]  netlink_rcv_skb+0xcf/0xf0\n[   95.972720]  netlink_unicast+0x16d/0x220\n[   95.972781]  netlink_sendmsg+0x2ba/0x3a0\n[   95.975891]  sock_sendmsg+0x4c/0x50\n[   95.979032]  ___sys_sendmsg+0x2e4/0x300\n[   95.982147]  ? kmem_cache_alloc+0x13e/0x190\n[   95.985242]  ? __wake_up_common_lock+0x79/0x90\n[   95.988338]  ? __check_object_size+0xac/0x1b0\n[   95.991440]  ? _copy_to_user+0x22/0x30\n[   95.994539]  ? move_addr_to_user+0xbb/0xd0\n[   95.997619]  ? __sys_sendmsg+0x53/0x80\n[   96.000664]  __sys_sendmsg+0x53/0x80\n[   96.003747]  do_syscall_64+0x5b/0x1d0\n[   96.006862]  entry_SYSCALL_64_after_hwframe+0x65/0xca\n\nOnly update num_txq/rxq when passed check, and restore tc_cfg if setup\nqueue map failed.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-48652",
          "url": "https://www.suse.com/security/cve/CVE-2022-48652"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223520 for CVE-2022-48652",
          "url": "https://bugzilla.suse.com/1223520"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T09:29:37Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-48652"
    },
    {
      "cve": "CVE-2022-48653",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-48653"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nice: Don\u0027t double unplug aux on peer initiated reset\n\nIn the IDC callback that is accessed when the aux drivers request a reset,\nthe function to unplug the aux devices is called.  This function is also\ncalled in the ice_prepare_for_reset function. This double call is causing\na \"scheduling while atomic\" BUG.\n\n[  662.676430] ice 0000:4c:00.0 rocep76s0: cqp opcode = 0x1 maj_err_code = 0xffff min_err_code = 0x8003\n\n[  662.676609] ice 0000:4c:00.0 rocep76s0: [Modify QP Cmd Error][op_code=8] status=-29 waiting=1 completion_err=1 maj=0xffff min=0x8003\n\n[  662.815006] ice 0000:4c:00.0 rocep76s0: ICE OICR event notification: oicr = 0x10000003\n\n[  662.815014] ice 0000:4c:00.0 rocep76s0: critical PE Error, GLPE_CRITERR=0x00011424\n\n[  662.815017] ice 0000:4c:00.0 rocep76s0: Requesting a reset\n\n[  662.815475] BUG: scheduling while atomic: swapper/37/0/0x00010002\n\n[  662.815475] BUG: scheduling while atomic: swapper/37/0/0x00010002\n[  662.815477] Modules linked in: rpcsec_gss_krb5 auth_rpcgss nfsv4 dns_resolver nfs lockd grace fscache netfs rfkill 8021q garp mrp stp llc vfat fat rpcrdma intel_rapl_msr intel_rapl_common sunrpc i10nm_edac rdma_ucm nfit ib_srpt libnvdimm ib_isert iscsi_target_mod x86_pkg_temp_thermal intel_powerclamp coretemp target_core_mod snd_hda_intel ib_iser snd_intel_dspcfg libiscsi snd_intel_sdw_acpi scsi_transport_iscsi kvm_intel iTCO_wdt rdma_cm snd_hda_codec kvm iw_cm ipmi_ssif iTCO_vendor_support snd_hda_core irqbypass crct10dif_pclmul crc32_pclmul ghash_clmulni_intel snd_hwdep snd_seq snd_seq_device rapl snd_pcm snd_timer isst_if_mbox_pci pcspkr isst_if_mmio irdma intel_uncore idxd acpi_ipmi joydev isst_if_common snd mei_me idxd_bus ipmi_si soundcore i2c_i801 mei ipmi_devintf i2c_smbus i2c_ismt ipmi_msghandler acpi_power_meter acpi_pad rv(OE) ib_uverbs ib_cm ib_core xfs libcrc32c ast i2c_algo_bit drm_vram_helper drm_kms_helper syscopyarea sysfillrect sysimgblt fb_sys_fops drm_ttm_helpe\n r ttm\n[  662.815546]  nvme nvme_core ice drm crc32c_intel i40e t10_pi wmi pinctrl_emmitsburg dm_mirror dm_region_hash dm_log dm_mod fuse\n[  662.815557] Preemption disabled at:\n[  662.815558] [\u003c0000000000000000\u003e] 0x0\n[  662.815563] CPU: 37 PID: 0 Comm: swapper/37 Kdump: loaded Tainted: G S         OE     5.17.1 #2\n[  662.815566] Hardware name: Intel Corporation D50DNP/D50DNP, BIOS SE5C6301.86B.6624.D18.2111021741 11/02/2021\n[  662.815568] Call Trace:\n[  662.815572]  \u003cIRQ\u003e\n[  662.815574]  dump_stack_lvl+0x33/0x42\n[  662.815581]  __schedule_bug.cold.147+0x7d/0x8a\n[  662.815588]  __schedule+0x798/0x990\n[  662.815595]  schedule+0x44/0xc0\n[  662.815597]  schedule_preempt_disabled+0x14/0x20\n[  662.815600]  __mutex_lock.isra.11+0x46c/0x490\n[  662.815603]  ? __ibdev_printk+0x76/0xc0 [ib_core]\n[  662.815633]  device_del+0x37/0x3d0\n[  662.815639]  ice_unplug_aux_dev+0x1a/0x40 [ice]\n[  662.815674]  ice_schedule_reset+0x3c/0xd0 [ice]\n[  662.815693]  irdma_iidc_event_handler.cold.7+0xb6/0xd3 [irdma]\n[  662.815712]  ? bitmap_find_next_zero_area_off+0x45/0xa0\n[  662.815719]  ice_send_event_to_aux+0x54/0x70 [ice]\n[  662.815741]  ice_misc_intr+0x21d/0x2d0 [ice]\n[  662.815756]  __handle_irq_event_percpu+0x4c/0x180\n[  662.815762]  handle_irq_event_percpu+0xf/0x40\n[  662.815764]  handle_irq_event+0x34/0x60\n[  662.815766]  handle_edge_irq+0x9a/0x1c0\n[  662.815770]  __common_interrupt+0x62/0x100\n[  662.815774]  common_interrupt+0xb4/0xd0\n[  662.815779]  \u003c/IRQ\u003e\n[  662.815780]  \u003cTASK\u003e\n[  662.815780]  asm_common_interrupt+0x1e/0x40\n[  662.815785] RIP: 0010:cpuidle_enter_state+0xd6/0x380\n[  662.815789] Code: 49 89 c4 0f 1f 44 00 00 31 ff e8 65 d7 95 ff 45 84 ff 74 12 9c 58 f6 c4 02 0f 85 64 02 00 00 31 ff e8 ae c5 9c ff fb 45 85 f6 \u003c0f\u003e 88 12 01 00 00 49 63 d6 4c 2b 24 24 48 8d 04 52 48 8d 04 82 49\n[  662.815791] RSP: 0018:ff2c2c4f18edbe80 EFLAGS: 00000202\n[  662.815793] RAX: ff280805df140000 RBX: 0000000000000002 RCX: 000000000000001f\n[  662.815795] RDX: 0000009a52da2d08 R\n---truncated---",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-48653",
          "url": "https://www.suse.com/security/cve/CVE-2022-48653"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223474 for CVE-2022-48653",
          "url": "https://bugzilla.suse.com/1223474"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T09:29:37Z",
          "details": "low"
        }
      ],
      "title": "CVE-2022-48653"
    },
    {
      "cve": "CVE-2022-48654",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-48654"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nfnetlink_osf: fix possible bogus match in nf_osf_find()\n\nnf_osf_find() incorrectly returns true on mismatch, this leads to\ncopying uninitialized memory area in nft_osf which can be used to leak\nstale kernel stack data to userspace.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-48654",
          "url": "https://www.suse.com/security/cve/CVE-2022-48654"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223482 for CVE-2022-48654",
          "url": "https://bugzilla.suse.com/1223482"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T09:29:37Z",
          "details": "low"
        }
      ],
      "title": "CVE-2022-48654"
    },
    {
      "cve": "CVE-2022-48655",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-48655"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfirmware: arm_scmi: Harden accesses to the reset domains\n\nAccessing reset domains descriptors by the index upon the SCMI drivers\nrequests through the SCMI reset operations interface can potentially\nlead to out-of-bound violations if the SCMI driver misbehave.\n\nAdd an internal consistency check before any such domains descriptors\naccesses.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-48655",
          "url": "https://www.suse.com/security/cve/CVE-2022-48655"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223477 for CVE-2022-48655",
          "url": "https://bugzilla.suse.com/1223477"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T09:29:37Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-48655"
    },
    {
      "cve": "CVE-2022-48656",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-48656"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndmaengine: ti: k3-udma-private: Fix refcount leak bug in of_xudma_dev_get()\n\nWe should call of_node_put() for the reference returned by\nof_parse_phandle() in fail path or when it is not used anymore.\nHere we only need to move the of_node_put() before the check.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-48656",
          "url": "https://www.suse.com/security/cve/CVE-2022-48656"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223479 for CVE-2022-48656",
          "url": "https://bugzilla.suse.com/1223479"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T09:29:37Z",
          "details": "low"
        }
      ],
      "title": "CVE-2022-48656"
    },
    {
      "cve": "CVE-2022-48657",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-48657"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\narm64: topology: fix possible overflow in amu_fie_setup()\n\ncpufreq_get_hw_max_freq() returns max frequency in kHz as *unsigned int*,\nwhile freq_inv_set_max_ratio() gets passed this frequency in Hz as \u0027u64\u0027.\nMultiplying max frequency by 1000 can potentially result in overflow --\nmultiplying by 1000ULL instead should avoid that...\n\nFound by Linux Verification Center (linuxtesting.org) with the SVACE static\nanalysis tool.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-48657",
          "url": "https://www.suse.com/security/cve/CVE-2022-48657"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223484 for CVE-2022-48657",
          "url": "https://bugzilla.suse.com/1223484"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T09:29:37Z",
          "details": "low"
        }
      ],
      "title": "CVE-2022-48657"
    },
    {
      "cve": "CVE-2022-48658",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-48658"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm: slub: fix flush_cpu_slab()/__free_slab() invocations in task context.\n\nCommit 5a836bf6b09f (\"mm: slub: move flush_cpu_slab() invocations\n__free_slab() invocations out of IRQ context\") moved all flush_cpu_slab()\ninvocations to the global workqueue to avoid a problem related\nwith deactivate_slab()/__free_slab() being called from an IRQ context\non PREEMPT_RT kernels.\n\nWhen the flush_all_cpu_locked() function is called from a task context\nit may happen that a workqueue with WQ_MEM_RECLAIM bit set ends up\nflushing the global workqueue, this will cause a dependency issue.\n\n workqueue: WQ_MEM_RECLAIM nvme-delete-wq:nvme_delete_ctrl_work [nvme_core]\n   is flushing !WQ_MEM_RECLAIM events:flush_cpu_slab\n WARNING: CPU: 37 PID: 410 at kernel/workqueue.c:2637\n   check_flush_dependency+0x10a/0x120\n Workqueue: nvme-delete-wq nvme_delete_ctrl_work [nvme_core]\n RIP: 0010:check_flush_dependency+0x10a/0x120[  453.262125] Call Trace:\n __flush_work.isra.0+0xbf/0x220\n ? __queue_work+0x1dc/0x420\n flush_all_cpus_locked+0xfb/0x120\n __kmem_cache_shutdown+0x2b/0x320\n kmem_cache_destroy+0x49/0x100\n bioset_exit+0x143/0x190\n blk_release_queue+0xb9/0x100\n kobject_cleanup+0x37/0x130\n nvme_fc_ctrl_free+0xc6/0x150 [nvme_fc]\n nvme_free_ctrl+0x1ac/0x2b0 [nvme_core]\n\nFix this bug by creating a workqueue for the flush operation with\nthe WQ_MEM_RECLAIM bit set.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-48658",
          "url": "https://www.suse.com/security/cve/CVE-2022-48658"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223496 for CVE-2022-48658",
          "url": "https://bugzilla.suse.com/1223496"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T09:29:37Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-48658"
    },
    {
      "cve": "CVE-2022-48659",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-48659"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm/slub: fix to return errno if kmalloc() fails\n\nIn create_unique_id(), kmalloc(, GFP_KERNEL) can fail due to\nout-of-memory, if it fails, return errno correctly rather than\ntriggering panic via BUG_ON();\n\nkernel BUG at mm/slub.c:5893!\nInternal error: Oops - BUG: 0 [#1] PREEMPT SMP\n\nCall trace:\n sysfs_slab_add+0x258/0x260 mm/slub.c:5973\n __kmem_cache_create+0x60/0x118 mm/slub.c:4899\n create_cache mm/slab_common.c:229 [inline]\n kmem_cache_create_usercopy+0x19c/0x31c mm/slab_common.c:335\n kmem_cache_create+0x1c/0x28 mm/slab_common.c:390\n f2fs_kmem_cache_create fs/f2fs/f2fs.h:2766 [inline]\n f2fs_init_xattr_caches+0x78/0xb4 fs/f2fs/xattr.c:808\n f2fs_fill_super+0x1050/0x1e0c fs/f2fs/super.c:4149\n mount_bdev+0x1b8/0x210 fs/super.c:1400\n f2fs_mount+0x44/0x58 fs/f2fs/super.c:4512\n legacy_get_tree+0x30/0x74 fs/fs_context.c:610\n vfs_get_tree+0x40/0x140 fs/super.c:1530\n do_new_mount+0x1dc/0x4e4 fs/namespace.c:3040\n path_mount+0x358/0x914 fs/namespace.c:3370\n do_mount fs/namespace.c:3383 [inline]\n __do_sys_mount fs/namespace.c:3591 [inline]\n __se_sys_mount fs/namespace.c:3568 [inline]\n __arm64_sys_mount+0x2f8/0x408 fs/namespace.c:3568",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-48659",
          "url": "https://www.suse.com/security/cve/CVE-2022-48659"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223498 for CVE-2022-48659",
          "url": "https://bugzilla.suse.com/1223498"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T09:29:37Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-48659"
    },
    {
      "cve": "CVE-2022-48660",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-48660"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ngpiolib: cdev: Set lineevent_state::irq after IRQ register successfully\n\nWhen running gpio test on nxp-ls1028 platform with below command\ngpiomon --num-events=3 --rising-edge gpiochip1 25\nThere will be a warning trace as below:\nCall trace:\nfree_irq+0x204/0x360\nlineevent_free+0x64/0x70\ngpio_ioctl+0x598/0x6a0\n__arm64_sys_ioctl+0xb4/0x100\ninvoke_syscall+0x5c/0x130\n......\nel0t_64_sync+0x1a0/0x1a4\nThe reason of this issue is that calling request_threaded_irq()\nfunction failed, and then lineevent_free() is invoked to release\nthe resource. Since the lineevent_state::irq was already set, so\nthe subsequent invocation of free_irq() would trigger the above\nwarning call trace. To fix this issue, set the lineevent_state::irq\nafter the IRQ register successfully.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-48660",
          "url": "https://www.suse.com/security/cve/CVE-2022-48660"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223487 for CVE-2022-48660",
          "url": "https://bugzilla.suse.com/1223487"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T09:29:37Z",
          "details": "low"
        }
      ],
      "title": "CVE-2022-48660"
    },
    {
      "cve": "CVE-2022-48662",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-48662"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/i915/gem: Really move i915_gem_context.link under ref protection\n\ni915_perf assumes that it can use the i915_gem_context reference to\nprotect its i915-\u003egem.contexts.list iteration. However, this requires\nthat we do not remove the context from the list until after we drop the\nfinal reference and release the struct. If, as currently, we remove the\ncontext from the list during context_close(), the link.next pointer may\nbe poisoned while we are holding the context reference and cause a GPF:\n\n[ 4070.573157] i915 0000:00:02.0: [drm:i915_perf_open_ioctl [i915]] filtering on ctx_id=0x1fffff ctx_id_mask=0x1fffff\n[ 4070.574881] general protection fault, probably for non-canonical address 0xdead000000000100: 0000 [#1] PREEMPT SMP\n[ 4070.574897] CPU: 1 PID: 284392 Comm: amd_performance Tainted: G            E     5.17.9 #180\n[ 4070.574903] Hardware name: Intel Corporation NUC7i5BNK/NUC7i5BNB, BIOS BNKBL357.86A.0052.2017.0918.1346 09/18/2017\n[ 4070.574907] RIP: 0010:oa_configure_all_contexts.isra.0+0x222/0x350 [i915]\n[ 4070.574982] Code: 08 e8 32 6e 10 e1 4d 8b 6d 50 b8 ff ff ff ff 49 83 ed 50 f0 41 0f c1 04 24 83 f8 01 0f 84 e3 00 00 00 85 c0 0f 8e fa 00 00 00 \u003c49\u003e 8b 45 50 48 8d 70 b0 49 8d 45 50 48 39 44 24 10 0f 85 34 fe ff\n[ 4070.574990] RSP: 0018:ffffc90002077b78 EFLAGS: 00010202\n[ 4070.574995] RAX: 0000000000000002 RBX: 0000000000000002 RCX: 0000000000000000\n[ 4070.575000] RDX: 0000000000000001 RSI: ffffc90002077b20 RDI: ffff88810ddc7c68\n[ 4070.575004] RBP: 0000000000000001 R08: ffff888103242648 R09: fffffffffffffffc\n[ 4070.575008] R10: ffffffff82c50bc0 R11: 0000000000025c80 R12: ffff888101bf1860\n[ 4070.575012] R13: dead0000000000b0 R14: ffffc90002077c04 R15: ffff88810be5cabc\n[ 4070.575016] FS:  00007f1ed50c0780(0000) GS:ffff88885ec80000(0000) knlGS:0000000000000000\n[ 4070.575021] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[ 4070.575025] CR2: 00007f1ed5590280 CR3: 000000010ef6f005 CR4: 00000000003706e0\n[ 4070.575029] Call Trace:\n[ 4070.575033]  \u003cTASK\u003e\n[ 4070.575037]  lrc_configure_all_contexts+0x13e/0x150 [i915]\n[ 4070.575103]  gen8_enable_metric_set+0x4d/0x90 [i915]\n[ 4070.575164]  i915_perf_open_ioctl+0xbc0/0x1500 [i915]\n[ 4070.575224]  ? asm_common_interrupt+0x1e/0x40\n[ 4070.575232]  ? i915_oa_init_reg_state+0x110/0x110 [i915]\n[ 4070.575290]  drm_ioctl_kernel+0x85/0x110\n[ 4070.575296]  ? update_load_avg+0x5f/0x5e0\n[ 4070.575302]  drm_ioctl+0x1d3/0x370\n[ 4070.575307]  ? i915_oa_init_reg_state+0x110/0x110 [i915]\n[ 4070.575382]  ? gen8_gt_irq_handler+0x46/0x130 [i915]\n[ 4070.575445]  __x64_sys_ioctl+0x3c4/0x8d0\n[ 4070.575451]  ? __do_softirq+0xaa/0x1d2\n[ 4070.575456]  do_syscall_64+0x35/0x80\n[ 4070.575461]  entry_SYSCALL_64_after_hwframe+0x44/0xae\n[ 4070.575467] RIP: 0033:0x7f1ed5c10397\n[ 4070.575471] Code: 3c 1c e8 1c ff ff ff 85 c0 79 87 49 c7 c4 ff ff ff ff 5b 5d 4c 89 e0 41 5c c3 66 0f 1f 84 00 00 00 00 00 b8 10 00 00 00 0f 05 \u003c48\u003e 3d 01 f0 ff ff 73 01 c3 48 8b 0d a9 da 0d 00 f7 d8 64 89 01 48\n[ 4070.575478] RSP: 002b:00007ffd65c8d7a8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010\n[ 4070.575484] RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 00007f1ed5c10397\n[ 4070.575488] RDX: 00007ffd65c8d7c0 RSI: 0000000040106476 RDI: 0000000000000006\n[ 4070.575492] RBP: 00005620972f9c60 R08: 000000000000000a R09: 0000000000000005\n[ 4070.575496] R10: 000000000000000d R11: 0000000000000246 R12: 000000000000000a\n[ 4070.575500] R13: 000000000000000d R14: 0000000000000000 R15: 00007ffd65c8d7c0\n[ 4070.575505]  \u003c/TASK\u003e\n[ 4070.575507] Modules linked in: nls_ascii(E) nls_cp437(E) vfat(E) fat(E) i915(E) x86_pkg_temp_thermal(E) intel_powerclamp(E) crct10dif_pclmul(E) crc32_pclmul(E) crc32c_intel(E) aesni_intel(E) crypto_simd(E) intel_gtt(E) cryptd(E) ttm(E) rapl(E) intel_cstate(E) drm_kms_helper(E) cfbfillrect(E) syscopyarea(E) cfbimgblt(E) intel_uncore(E) sysfillrect(E) mei_me(E) sysimgblt(E) i2c_i801(E) fb_sys_fops(E) mei(E) intel_pch_thermal(E) i2c_smbus\n---truncated---",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-48662",
          "url": "https://www.suse.com/security/cve/CVE-2022-48662"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223505 for CVE-2022-48662",
          "url": "https://bugzilla.suse.com/1223505"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223521 for CVE-2022-48662",
          "url": "https://bugzilla.suse.com/1223521"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T09:29:37Z",
          "details": "important"
        }
      ],
      "title": "CVE-2022-48662"
    },
    {
      "cve": "CVE-2022-48663",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-48663"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ngpio: mockup: fix NULL pointer dereference when removing debugfs\n\nWe now remove the device\u0027s debugfs entries when unbinding the driver.\nThis now causes a NULL-pointer dereference on module exit because the\nplatform devices are unregistered *after* the global debugfs directory\nhas been recursively removed. Fix it by unregistering the devices first.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-48663",
          "url": "https://www.suse.com/security/cve/CVE-2022-48663"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223523 for CVE-2022-48663",
          "url": "https://bugzilla.suse.com/1223523"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T09:29:37Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-48663"
    },
    {
      "cve": "CVE-2022-48667",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-48667"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmb3: fix temporary data corruption in insert range\n\ninsert range doesn\u0027t discard the affected cached region\nso can risk temporarily corrupting file data.\n\nAlso includes some minor cleanup (avoiding rereading\ninode size repeatedly unnecessarily) to make it clearer.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-48667",
          "url": "https://www.suse.com/security/cve/CVE-2022-48667"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223518 for CVE-2022-48667",
          "url": "https://bugzilla.suse.com/1223518"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T09:29:37Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-48667"
    },
    {
      "cve": "CVE-2022-48668",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-48668"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmb3: fix temporary data corruption in collapse range\n\ncollapse range doesn\u0027t discard the affected cached region\nso can risk temporarily corrupting the file data. This\nfixes xfstest generic/031\n\nI also decided to merge a minor cleanup to this into the same patch\n(avoiding rereading inode size repeatedly unnecessarily) to make it\nclearer.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-48668",
          "url": "https://www.suse.com/security/cve/CVE-2022-48668"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223516 for CVE-2022-48668",
          "url": "https://bugzilla.suse.com/1223516"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T09:29:37Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-48668"
    },
    {
      "cve": "CVE-2022-48671",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-48671"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncgroup: Add missing cpus_read_lock() to cgroup_attach_task_all()\n\nsyzbot is hitting percpu_rwsem_assert_held(\u0026cpu_hotplug_lock) warning at\ncpuset_attach() [1], for commit 4f7e7236435ca0ab (\"cgroup: Fix\nthreadgroup_rwsem \u003c-\u003e cpus_read_lock() deadlock\") missed that\ncpuset_attach() is also called from cgroup_attach_task_all().\nAdd cpus_read_lock() like what cgroup_procs_write_start() does.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-48671",
          "url": "https://www.suse.com/security/cve/CVE-2022-48671"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223929 for CVE-2022-48671",
          "url": "https://bugzilla.suse.com/1223929"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T09:29:37Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-48671"
    },
    {
      "cve": "CVE-2022-48672",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-48672"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nof: fdt: fix off-by-one error in unflatten_dt_nodes()\n\nCommit 78c44d910d3e (\"drivers/of: Fix depth when unflattening devicetree\")\nforgot to fix up the depth check in the loop body in unflatten_dt_nodes()\nwhich makes it possible to overflow the nps[] buffer...\n\nFound by Linux Verification Center (linuxtesting.org) with the SVACE static\nanalysis tool.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-48672",
          "url": "https://www.suse.com/security/cve/CVE-2022-48672"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223931 for CVE-2022-48672",
          "url": "https://bugzilla.suse.com/1223931"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T09:29:37Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-48672"
    },
    {
      "cve": "CVE-2022-48673",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-48673"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/smc: Fix possible access to freed memory in link clear\n\nAfter modifying the QP to the Error state, all RX WR would be completed\nwith WC in IB_WC_WR_FLUSH_ERR status. Current implementation does not\nwait for it is done, but destroy the QP and free the link group directly.\nSo there is a risk that accessing the freed memory in tasklet context.\n\nHere is a crash example:\n\n BUG: unable to handle page fault for address: ffffffff8f220860\n #PF: supervisor write access in kernel mode\n #PF: error_code(0x0002) - not-present page\n PGD f7300e067 P4D f7300e067 PUD f7300f063 PMD 8c4e45063 PTE 800ffff08c9df060\n Oops: 0002 [#1] SMP PTI\n CPU: 1 PID: 0 Comm: swapper/1 Kdump: loaded Tainted: G S         OE     5.10.0-0607+ #23\n Hardware name: Inspur NF5280M4/YZMB-00689-101, BIOS 4.1.20 07/09/2018\n RIP: 0010:native_queued_spin_lock_slowpath+0x176/0x1b0\n Code: f3 90 48 8b 32 48 85 f6 74 f6 eb d5 c1 ee 12 83 e0 03 83 ee 01 48 c1 e0 05 48 63 f6 48 05 00 c8 02 00 48 03 04 f5 00 09 98 8e \u003c48\u003e 89 10 8b 42 08 85 c0 75 09 f3 90 8b 42 08 85 c0 74 f7 48 8b 32\n RSP: 0018:ffffb3b6c001ebd8 EFLAGS: 00010086\n RAX: ffffffff8f220860 RBX: 0000000000000246 RCX: 0000000000080000\n RDX: ffff91db1f86c800 RSI: 000000000000173c RDI: ffff91db62bace00\n RBP: ffff91db62bacc00 R08: 0000000000000000 R09: c00000010000028b\n R10: 0000000000055198 R11: ffffb3b6c001ea58 R12: ffff91db80e05010\n R13: 000000000000000a R14: 0000000000000006 R15: 0000000000000040\n FS:  0000000000000000(0000) GS:ffff91db1f840000(0000) knlGS:0000000000000000\n CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n CR2: ffffffff8f220860 CR3: 00000001f9580004 CR4: 00000000003706e0\n DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\n Call Trace:\n  \u003cIRQ\u003e\n  _raw_spin_lock_irqsave+0x30/0x40\n  mlx5_ib_poll_cq+0x4c/0xc50 [mlx5_ib]\n  smc_wr_rx_tasklet_fn+0x56/0xa0 [smc]\n  tasklet_action_common.isra.21+0x66/0x100\n  __do_softirq+0xd5/0x29c\n  asm_call_irq_on_stack+0x12/0x20\n  \u003c/IRQ\u003e\n  do_softirq_own_stack+0x37/0x40\n  irq_exit_rcu+0x9d/0xa0\n  sysvec_call_function_single+0x34/0x80\n  asm_sysvec_call_function_single+0x12/0x20",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-48673",
          "url": "https://www.suse.com/security/cve/CVE-2022-48673"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223934 for CVE-2022-48673",
          "url": "https://bugzilla.suse.com/1223934"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223940 for CVE-2022-48673",
          "url": "https://bugzilla.suse.com/1223940"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T09:29:37Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-48673"
    },
    {
      "cve": "CVE-2022-48675",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-48675"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nIB/core: Fix a nested dead lock as part of ODP flow\n\nFix a nested dead lock as part of ODP flow by using mmput_async().\n\nFrom the below call trace [1] can see that calling mmput() once we have\nthe umem_odp-\u003eumem_mutex locked as required by\nib_umem_odp_map_dma_and_lock() might trigger in the same task the\nexit_mmap()-\u003e__mmu_notifier_release()-\u003emlx5_ib_invalidate_range() which\nmay dead lock when trying to lock the same mutex.\n\nMoving to use mmput_async() will solve the problem as the above\nexit_mmap() flow will be called in other task and will be executed once\nthe lock will be available.\n\n[1]\n[64843.077665] task:kworker/u133:2  state:D stack:    0 pid:80906 ppid:\n2 flags:0x00004000\n[64843.077672] Workqueue: mlx5_ib_page_fault mlx5_ib_eqe_pf_action [mlx5_ib]\n[64843.077719] Call Trace:\n[64843.077722]  \u003cTASK\u003e\n[64843.077724]  __schedule+0x23d/0x590\n[64843.077729]  schedule+0x4e/0xb0\n[64843.077735]  schedule_preempt_disabled+0xe/0x10\n[64843.077740]  __mutex_lock.constprop.0+0x263/0x490\n[64843.077747]  __mutex_lock_slowpath+0x13/0x20\n[64843.077752]  mutex_lock+0x34/0x40\n[64843.077758]  mlx5_ib_invalidate_range+0x48/0x270 [mlx5_ib]\n[64843.077808]  __mmu_notifier_release+0x1a4/0x200\n[64843.077816]  exit_mmap+0x1bc/0x200\n[64843.077822]  ? walk_page_range+0x9c/0x120\n[64843.077828]  ? __cond_resched+0x1a/0x50\n[64843.077833]  ? mutex_lock+0x13/0x40\n[64843.077839]  ? uprobe_clear_state+0xac/0x120\n[64843.077860]  mmput+0x5f/0x140\n[64843.077867]  ib_umem_odp_map_dma_and_lock+0x21b/0x580 [ib_core]\n[64843.077931]  pagefault_real_mr+0x9a/0x140 [mlx5_ib]\n[64843.077962]  pagefault_mr+0xb4/0x550 [mlx5_ib]\n[64843.077992]  pagefault_single_data_segment.constprop.0+0x2ac/0x560\n[mlx5_ib]\n[64843.078022]  mlx5_ib_eqe_pf_action+0x528/0x780 [mlx5_ib]\n[64843.078051]  process_one_work+0x22b/0x3d0\n[64843.078059]  worker_thread+0x53/0x410\n[64843.078065]  ? process_one_work+0x3d0/0x3d0\n[64843.078073]  kthread+0x12a/0x150\n[64843.078079]  ? set_kthread_struct+0x50/0x50\n[64843.078085]  ret_from_fork+0x22/0x30\n[64843.078093]  \u003c/TASK\u003e",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-48675",
          "url": "https://www.suse.com/security/cve/CVE-2022-48675"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223894 for CVE-2022-48675",
          "url": "https://bugzilla.suse.com/1223894"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T09:29:37Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-48675"
    },
    {
      "cve": "CVE-2022-48686",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-48686"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnvme-tcp: fix UAF when detecting digest errors\n\nWe should also bail from the io_work loop when we set rd_enabled to true,\nso we don\u0027t attempt to read data from the socket when the TCP stream is\nalready out-of-sync or corrupted.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-48686",
          "url": "https://www.suse.com/security/cve/CVE-2022-48686"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223948 for CVE-2022-48686",
          "url": "https://bugzilla.suse.com/1223948"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1226337 for CVE-2022-48686",
          "url": "https://bugzilla.suse.com/1226337"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T09:29:37Z",
          "details": "important"
        }
      ],
      "title": "CVE-2022-48686"
    },
    {
      "cve": "CVE-2022-48687",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-48687"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipv6: sr: fix out-of-bounds read when setting HMAC data.\n\nThe SRv6 layer allows defining HMAC data that can later be used to sign IPv6\nSegment Routing Headers. This configuration is realised via netlink through\nfour attributes: SEG6_ATTR_HMACKEYID, SEG6_ATTR_SECRET, SEG6_ATTR_SECRETLEN and\nSEG6_ATTR_ALGID. Because the SECRETLEN attribute is decoupled from the actual\nlength of the SECRET attribute, it is possible to provide invalid combinations\n(e.g., secret = \"\", secretlen = 64). This case is not checked in the code and\nwith an appropriately crafted netlink message, an out-of-bounds read of up\nto 64 bytes (max secret length) can occur past the skb end pointer and into\nskb_shared_info:\n\nBreakpoint 1, seg6_genl_sethmac (skb=\u003coptimized out\u003e, info=\u003coptimized out\u003e) at net/ipv6/seg6.c:208\n208\t\tmemcpy(hinfo-\u003esecret, secret, slen);\n(gdb) bt\n #0  seg6_genl_sethmac (skb=\u003coptimized out\u003e, info=\u003coptimized out\u003e) at net/ipv6/seg6.c:208\n #1  0xffffffff81e012e9 in genl_family_rcv_msg_doit (skb=skb@entry=0xffff88800b1f9f00, nlh=nlh@entry=0xffff88800b1b7600,\n    extack=extack@entry=0xffffc90000ba7af0, ops=ops@entry=0xffffc90000ba7a80, hdrlen=4, net=0xffffffff84237580 \u003cinit_net\u003e, family=\u003coptimized out\u003e,\n    family=\u003coptimized out\u003e) at net/netlink/genetlink.c:731\n #2  0xffffffff81e01435 in genl_family_rcv_msg (extack=0xffffc90000ba7af0, nlh=0xffff88800b1b7600, skb=0xffff88800b1f9f00,\n    family=0xffffffff82fef6c0 \u003cseg6_genl_family\u003e) at net/netlink/genetlink.c:775\n #3  genl_rcv_msg (skb=0xffff88800b1f9f00, nlh=0xffff88800b1b7600, extack=0xffffc90000ba7af0) at net/netlink/genetlink.c:792\n #4  0xffffffff81dfffc3 in netlink_rcv_skb (skb=skb@entry=0xffff88800b1f9f00, cb=cb@entry=0xffffffff81e01350 \u003cgenl_rcv_msg\u003e)\n    at net/netlink/af_netlink.c:2501\n #5  0xffffffff81e00919 in genl_rcv (skb=0xffff88800b1f9f00) at net/netlink/genetlink.c:803\n #6  0xffffffff81dff6ae in netlink_unicast_kernel (ssk=0xffff888010eec800, skb=0xffff88800b1f9f00, sk=0xffff888004aed000)\n    at net/netlink/af_netlink.c:1319\n #7  netlink_unicast (ssk=ssk@entry=0xffff888010eec800, skb=skb@entry=0xffff88800b1f9f00, portid=portid@entry=0, nonblock=\u003coptimized out\u003e)\n    at net/netlink/af_netlink.c:1345\n #8  0xffffffff81dff9a4 in netlink_sendmsg (sock=\u003coptimized out\u003e, msg=0xffffc90000ba7e48, len=\u003coptimized out\u003e) at net/netlink/af_netlink.c:1921\n...\n(gdb) p/x ((struct sk_buff *)0xffff88800b1f9f00)-\u003ehead + ((struct sk_buff *)0xffff88800b1f9f00)-\u003eend\n$1 = 0xffff88800b1b76c0\n(gdb) p/x secret\n$2 = 0xffff88800b1b76c0\n(gdb) p slen\n$3 = 64 \u0027@\u0027\n\nThe OOB data can then be read back from userspace by dumping HMAC state. This\ncommit fixes this by ensuring SECRETLEN cannot exceed the actual length of\nSECRET.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-48687",
          "url": "https://www.suse.com/security/cve/CVE-2022-48687"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223952 for CVE-2022-48687",
          "url": "https://bugzilla.suse.com/1223952"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1224043 for CVE-2022-48687",
          "url": "https://bugzilla.suse.com/1224043"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T09:29:37Z",
          "details": "important"
        }
      ],
      "title": "CVE-2022-48687"
    },
    {
      "cve": "CVE-2022-48688",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-48688"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ni40e: Fix kernel crash during module removal\n\nThe driver incorrectly frees client instance and subsequent\ni40e module removal leads to kernel crash.\n\nReproducer:\n1. Do ethtool offline test followed immediately by another one\nhost# ethtool -t eth0 offline; ethtool -t eth0 offline\n2. Remove recursively irdma module that also removes i40e module\nhost# modprobe -r irdma\n\nResult:\n[ 8675.035651] i40e 0000:3d:00.0 eno1: offline testing starting\n[ 8675.193774] i40e 0000:3d:00.0 eno1: testing finished\n[ 8675.201316] i40e 0000:3d:00.0 eno1: offline testing starting\n[ 8675.358921] i40e 0000:3d:00.0 eno1: testing finished\n[ 8675.496921] i40e 0000:3d:00.0: IRDMA hardware initialization FAILED init_state=2 status=-110\n[ 8686.188955] i40e 0000:3d:00.1: i40e_ptp_stop: removed PHC on eno2\n[ 8686.943890] i40e 0000:3d:00.1: Deleted LAN device PF1 bus=0x3d dev=0x00 func=0x01\n[ 8686.952669] i40e 0000:3d:00.0: i40e_ptp_stop: removed PHC on eno1\n[ 8687.761787] BUG: kernel NULL pointer dereference, address: 0000000000000030\n[ 8687.768755] #PF: supervisor read access in kernel mode\n[ 8687.773895] #PF: error_code(0x0000) - not-present page\n[ 8687.779034] PGD 0 P4D 0\n[ 8687.781575] Oops: 0000 [#1] PREEMPT SMP NOPTI\n[ 8687.785935] CPU: 51 PID: 172891 Comm: rmmod Kdump: loaded Tainted: G        W I        5.19.0+ #2\n[ 8687.794800] Hardware name: Intel Corporation S2600WFD/S2600WFD, BIOS SE5C620.86B.0X.02.0001.051420190324 05/14/2019\n[ 8687.805222] RIP: 0010:i40e_lan_del_device+0x13/0xb0 [i40e]\n[ 8687.810719] Code: d4 84 c0 0f 84 b8 25 01 00 e9 9c 25 01 00 41 bc f4 ff ff ff eb 91 90 0f 1f 44 00 00 41 54 55 53 48 8b 87 58 08 00 00 48 89 fb \u003c48\u003e 8b 68 30 48 89 ef e8 21 8a 0f d5 48 89 ef e8 a9 78 0f d5 48 8b\n[ 8687.829462] RSP: 0018:ffffa604072efce0 EFLAGS: 00010202\n[ 8687.834689] RAX: 0000000000000000 RBX: ffff8f43833b2000 RCX: 0000000000000000\n[ 8687.841821] RDX: 0000000000000000 RSI: ffff8f4b0545b298 RDI: ffff8f43833b2000\n[ 8687.848955] RBP: ffff8f43833b2000 R08: 0000000000000001 R09: 0000000000000000\n[ 8687.856086] R10: 0000000000000000 R11: 000ffffffffff000 R12: ffff8f43833b2ef0\n[ 8687.863218] R13: ffff8f43833b2ef0 R14: ffff915103966000 R15: ffff8f43833b2008\n[ 8687.870342] FS:  00007f79501c3740(0000) GS:ffff8f4adffc0000(0000) knlGS:0000000000000000\n[ 8687.878427] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[ 8687.884174] CR2: 0000000000000030 CR3: 000000014276e004 CR4: 00000000007706e0\n[ 8687.891306] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n[ 8687.898441] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\n[ 8687.905572] PKRU: 55555554\n[ 8687.908286] Call Trace:\n[ 8687.910737]  \u003cTASK\u003e\n[ 8687.912843]  i40e_remove+0x2c0/0x330 [i40e]\n[ 8687.917040]  pci_device_remove+0x33/0xa0\n[ 8687.920962]  device_release_driver_internal+0x1aa/0x230\n[ 8687.926188]  driver_detach+0x44/0x90\n[ 8687.929770]  bus_remove_driver+0x55/0xe0\n[ 8687.933693]  pci_unregister_driver+0x2a/0xb0\n[ 8687.937967]  i40e_exit_module+0xc/0xf48 [i40e]\n\nTwo offline tests cause IRDMA driver failure (ETIMEDOUT) and this\nfailure is indicated back to i40e_client_subtask() that calls\ni40e_client_del_instance() to free client instance referenced\nby pf-\u003ecinst and sets this pointer to NULL. During the module\nremoval i40e_remove() calls i40e_lan_del_device() that dereferences\npf-\u003ecinst that is NULL -\u003e crash.\nDo not remove client instance when client open callbacks fails and\njust clear __I40E_CLIENT_INSTANCE_OPENED bit. The driver also needs\nto take care about this situation (when netdev is up and client\nis NOT opened) in i40e_notify_client_of_netdev_close() and\ncalls client close callback only when __I40E_CLIENT_INSTANCE_OPENED\nis set.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-48688",
          "url": "https://www.suse.com/security/cve/CVE-2022-48688"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223953 for CVE-2022-48688",
          "url": "https://bugzilla.suse.com/1223953"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T09:29:37Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-48688"
    },
    {
      "cve": "CVE-2022-48690",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-48690"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nice: Fix DMA mappings leak\n\nFix leak, when user changes ring parameters.\nDuring reallocation of RX buffers, new DMA mappings are created for\nthose buffers. New buffers with different RX ring count should\nsubstitute older ones, but those buffers were freed in ice_vsi_cfg_rxq\nand reallocated again with ice_alloc_rx_buf. kfree on rx_buf caused\nleak of already mapped DMA.\nReallocate ZC with xdp_buf struct, when BPF program loads. Reallocate\nback to rx_buf, when BPF program unloads.\nIf BPF program is loaded/unloaded and XSK pools are created, reallocate\nRX queues accordingly in XDP_SETUP_XSK_POOL handler.\n\nSteps for reproduction:\nwhile :\ndo\n\tfor ((i=0; i\u003c=8160; i=i+32))\n\tdo\n\t\tethtool -G enp130s0f0 rx $i tx $i\n\t\tsleep 0.5\n\t\tethtool -g enp130s0f0\n\tdone\ndone",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-48690",
          "url": "https://www.suse.com/security/cve/CVE-2022-48690"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223960 for CVE-2022-48690",
          "url": "https://bugzilla.suse.com/1223960"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T09:29:37Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-48690"
    },
    {
      "cve": "CVE-2022-48692",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-48692"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/srp: Set scmnd-\u003eresult only when scmnd is not NULL\n\nThis change fixes the following kernel NULL pointer dereference\nwhich is reproduced by blktests srp/007 occasionally.\n\nBUG: kernel NULL pointer dereference, address: 0000000000000170\nPGD 0 P4D 0\nOops: 0002 [#1] PREEMPT SMP NOPTI\nCPU: 0 PID: 9 Comm: kworker/0:1H Kdump: loaded Not tainted 6.0.0-rc1+ #37\nHardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.15.0-29-g6a62e0cb0dfe-prebuilt.qemu.org 04/01/2014\nWorkqueue:  0x0 (kblockd)\nRIP: 0010:srp_recv_done+0x176/0x500 [ib_srp]\nCode: 00 4d 85 ff 0f 84 52 02 00 00 48 c7 82 80 02 00 00 00 00 00 00 4c 89 df 4c 89 14 24 e8 53 d3 4a f6 4c 8b 14 24 41 0f b6 42 13 \u003c41\u003e 89 87 70 01 00 00 41 0f b6 52 12 f6 c2 02 74 44 41 8b 42 1c b9\nRSP: 0018:ffffaef7c0003e28 EFLAGS: 00000282\nRAX: 0000000000000000 RBX: ffff9bc9486dea60 RCX: 0000000000000000\nRDX: 0000000000000102 RSI: ffffffffb76bbd0e RDI: 00000000ffffffff\nRBP: ffff9bc980099a00 R08: 0000000000000001 R09: 0000000000000001\nR10: ffff9bca53ef0000 R11: ffff9bc980099a10 R12: ffff9bc956e14000\nR13: ffff9bc9836b9cb0 R14: ffff9bc9557b4480 R15: 0000000000000000\nFS:  0000000000000000(0000) GS:ffff9bc97ec00000(0000) knlGS:0000000000000000\nCS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 0000000000000170 CR3: 0000000007e04000 CR4: 00000000000006f0\nCall Trace:\n \u003cIRQ\u003e\n __ib_process_cq+0xb7/0x280 [ib_core]\n ib_poll_handler+0x2b/0x130 [ib_core]\n irq_poll_softirq+0x93/0x150\n __do_softirq+0xee/0x4b8\n irq_exit_rcu+0xf7/0x130\n sysvec_apic_timer_interrupt+0x8e/0xc0\n \u003c/IRQ\u003e",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-48692",
          "url": "https://www.suse.com/security/cve/CVE-2022-48692"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223962 for CVE-2022-48692",
          "url": "https://bugzilla.suse.com/1223962"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T09:29:37Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-48692"
    },
    {
      "cve": "CVE-2022-48693",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-48693"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsoc: brcmstb: pm-arm: Fix refcount leak and __iomem leak bugs\n\nIn brcmstb_pm_probe(), there are two kinds of leak bugs:\n\n(1) we need to add of_node_put() when for_each__matching_node() breaks\n(2) we need to add iounmap() for each iomap in fail path",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-48693",
          "url": "https://www.suse.com/security/cve/CVE-2022-48693"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223963 for CVE-2022-48693",
          "url": "https://bugzilla.suse.com/1223963"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T09:29:37Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-48693"
    },
    {
      "cve": "CVE-2022-48694",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-48694"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/irdma: Fix drain SQ hang with no completion\n\nSW generated completions for outstanding WRs posted on SQ\nafter QP is in error target the wrong CQ. This causes the\nib_drain_sq to hang with no completion.\n\nFix this to generate completions on the right CQ.\n\n[  863.969340] INFO: task kworker/u52:2:671 blocked for more than 122 seconds.\n[  863.979224]       Not tainted 5.14.0-130.el9.x86_64 #1\n[  863.986588] \"echo 0 \u003e /proc/sys/kernel/hung_task_timeout_secs\" disables this message.\n[  863.996997] task:kworker/u52:2   state:D stack:    0 pid:  671 ppid:     2 flags:0x00004000\n[  864.007272] Workqueue: xprtiod xprt_autoclose [sunrpc]\n[  864.014056] Call Trace:\n[  864.017575]  __schedule+0x206/0x580\n[  864.022296]  schedule+0x43/0xa0\n[  864.026736]  schedule_timeout+0x115/0x150\n[  864.032185]  __wait_for_common+0x93/0x1d0\n[  864.037717]  ? usleep_range_state+0x90/0x90\n[  864.043368]  __ib_drain_sq+0xf6/0x170 [ib_core]\n[  864.049371]  ? __rdma_block_iter_next+0x80/0x80 [ib_core]\n[  864.056240]  ib_drain_sq+0x66/0x70 [ib_core]\n[  864.062003]  rpcrdma_xprt_disconnect+0x82/0x3b0 [rpcrdma]\n[  864.069365]  ? xprt_prepare_transmit+0x5d/0xc0 [sunrpc]\n[  864.076386]  xprt_rdma_close+0xe/0x30 [rpcrdma]\n[  864.082593]  xprt_autoclose+0x52/0x100 [sunrpc]\n[  864.088718]  process_one_work+0x1e8/0x3c0\n[  864.094170]  worker_thread+0x50/0x3b0\n[  864.099109]  ? rescuer_thread+0x370/0x370\n[  864.104473]  kthread+0x149/0x170\n[  864.109022]  ? set_kthread_struct+0x40/0x40\n[  864.114713]  ret_from_fork+0x22/0x30",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-48694",
          "url": "https://www.suse.com/security/cve/CVE-2022-48694"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223964 for CVE-2022-48694",
          "url": "https://bugzilla.suse.com/1223964"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T09:29:37Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-48694"
    },
    {
      "cve": "CVE-2022-48695",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-48695"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: mpt3sas: Fix use-after-free warning\n\nFix the following use-after-free warning which is observed during\ncontroller reset:\n\nrefcount_t: underflow; use-after-free.\nWARNING: CPU: 23 PID: 5399 at lib/refcount.c:28 refcount_warn_saturate+0xa6/0xf0",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-48695",
          "url": "https://www.suse.com/security/cve/CVE-2022-48695"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223941 for CVE-2022-48695",
          "url": "https://bugzilla.suse.com/1223941"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T09:29:37Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-48695"
    },
    {
      "cve": "CVE-2022-48697",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-48697"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnvmet: fix a use-after-free\n\nFix the following use-after-free complaint triggered by blktests nvme/004:\n\nBUG: KASAN: user-memory-access in blk_mq_complete_request_remote+0xac/0x350\nRead of size 4 at addr 0000607bd1835943 by task kworker/13:1/460\nWorkqueue: nvmet-wq nvme_loop_execute_work [nvme_loop]\nCall Trace:\n show_stack+0x52/0x58\n dump_stack_lvl+0x49/0x5e\n print_report.cold+0x36/0x1e2\n kasan_report+0xb9/0xf0\n __asan_load4+0x6b/0x80\n blk_mq_complete_request_remote+0xac/0x350\n nvme_loop_queue_response+0x1df/0x275 [nvme_loop]\n __nvmet_req_complete+0x132/0x4f0 [nvmet]\n nvmet_req_complete+0x15/0x40 [nvmet]\n nvmet_execute_io_connect+0x18a/0x1f0 [nvmet]\n nvme_loop_execute_work+0x20/0x30 [nvme_loop]\n process_one_work+0x56e/0xa70\n worker_thread+0x2d1/0x640\n kthread+0x183/0x1c0\n ret_from_fork+0x1f/0x30",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-48697",
          "url": "https://www.suse.com/security/cve/CVE-2022-48697"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223922 for CVE-2022-48697",
          "url": "https://bugzilla.suse.com/1223922"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T09:29:37Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-48697"
    },
    {
      "cve": "CVE-2022-48698",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-48698"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/display: fix memory leak when using debugfs_lookup()\n\nWhen calling debugfs_lookup() the result must have dput() called on it,\notherwise the memory will leak over time.  Fix this up by properly\ncalling dput().",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-48698",
          "url": "https://www.suse.com/security/cve/CVE-2022-48698"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223956 for CVE-2022-48698",
          "url": "https://bugzilla.suse.com/1223956"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T09:29:37Z",
          "details": "low"
        }
      ],
      "title": "CVE-2022-48698"
    },
    {
      "cve": "CVE-2022-48700",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-48700"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-48700",
          "url": "https://www.suse.com/security/cve/CVE-2022-48700"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223957 for CVE-2022-48700",
          "url": "https://bugzilla.suse.com/1223957"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T09:29:37Z",
          "details": "low"
        }
      ],
      "title": "CVE-2022-48700"
    },
    {
      "cve": "CVE-2022-48701",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-48701"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: usb-audio: Fix an out-of-bounds bug in __snd_usb_parse_audio_interface()\n\nThere may be a bad USB audio device with a USB ID of (0x04fa, 0x4201) and\nthe number of it\u0027s interfaces less than 4, an out-of-bounds read bug occurs\nwhen parsing the interface descriptor for this device.\n\nFix this by checking the number of interfaces.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-48701",
          "url": "https://www.suse.com/security/cve/CVE-2022-48701"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223921 for CVE-2022-48701",
          "url": "https://bugzilla.suse.com/1223921"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T09:29:37Z",
          "details": "low"
        }
      ],
      "title": "CVE-2022-48701"
    },
    {
      "cve": "CVE-2022-48702",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-48702"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: emu10k1: Fix out of bounds access in snd_emu10k1_pcm_channel_alloc()\n\nThe voice allocator sometimes begins allocating from near the end of the\narray and then wraps around, however snd_emu10k1_pcm_channel_alloc()\naccesses the newly allocated voices as if it never wrapped around.\n\nThis results in out of bounds access if the first voice has a high enough\nindex so that first_voice + requested_voice_count \u003e NUM_G (64).\nThe more voices are requested, the more likely it is for this to occur.\n\nThis was initially discovered using PipeWire, however it can be reproduced\nby calling aplay multiple times with 16 channels:\naplay -r 48000 -D plughw:CARD=Live,DEV=3 -c 16 /dev/zero\n\nUBSAN: array-index-out-of-bounds in sound/pci/emu10k1/emupcm.c:127:40\nindex 65 is out of range for type \u0027snd_emu10k1_voice [64]\u0027\nCPU: 1 PID: 31977 Comm: aplay Tainted: G        W IOE      6.0.0-rc2-emu10k1+ #7\nHardware name: ASUSTEK COMPUTER INC P5W DH Deluxe/P5W DH Deluxe, BIOS 3002    07/22/2010\nCall Trace:\n\u003cTASK\u003e\ndump_stack_lvl+0x49/0x63\ndump_stack+0x10/0x16\nubsan_epilogue+0x9/0x3f\n__ubsan_handle_out_of_bounds.cold+0x44/0x49\nsnd_emu10k1_playback_hw_params+0x3bc/0x420 [snd_emu10k1]\nsnd_pcm_hw_params+0x29f/0x600 [snd_pcm]\nsnd_pcm_common_ioctl+0x188/0x1410 [snd_pcm]\n? exit_to_user_mode_prepare+0x35/0x170\n? do_syscall_64+0x69/0x90\n? syscall_exit_to_user_mode+0x26/0x50\n? do_syscall_64+0x69/0x90\n? exit_to_user_mode_prepare+0x35/0x170\nsnd_pcm_ioctl+0x27/0x40 [snd_pcm]\n__x64_sys_ioctl+0x95/0xd0\ndo_syscall_64+0x5c/0x90\n? do_syscall_64+0x69/0x90\n? do_syscall_64+0x69/0x90\nentry_SYSCALL_64_after_hwframe+0x63/0xcd",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-48702",
          "url": "https://www.suse.com/security/cve/CVE-2022-48702"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223923 for CVE-2022-48702",
          "url": "https://bugzilla.suse.com/1223923"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T09:29:37Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-48702"
    },
    {
      "cve": "CVE-2022-48703",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-48703"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nthermal/int340x_thermal: handle data_vault when the value is ZERO_SIZE_PTR\n\nIn some case, the GDDV returns a package with a buffer which has\nzero length. It causes that kmemdup() returns ZERO_SIZE_PTR (0x10).\n\nThen the data_vault_read() got NULL point dereference problem when\naccessing the 0x10 value in data_vault.\n\n[   71.024560] BUG: kernel NULL pointer dereference, address:\n0000000000000010\n\nThis patch uses ZERO_OR_NULL_PTR() for checking ZERO_SIZE_PTR or\nNULL value in data_vault.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-48703",
          "url": "https://www.suse.com/security/cve/CVE-2022-48703"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223924 for CVE-2022-48703",
          "url": "https://bugzilla.suse.com/1223924"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T09:29:37Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-48703"
    },
    {
      "cve": "CVE-2022-48704",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-48704"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/radeon: add a force flush to delay work when radeon\n\nAlthough radeon card fence and wait for gpu to finish processing current batch rings,\nthere is still a corner case that radeon lockup work queue may not be fully flushed,\nand meanwhile the radeon_suspend_kms() function has called pci_set_power_state() to\nput device in D3hot state.\nPer PCI spec rev 4.0 on 5.3.1.4.1 D3hot State.\n\u003e Configuration and Message requests are the only TLPs accepted by a Function in\n\u003e the D3hot state. All other received Requests must be handled as Unsupported Requests,\n\u003e and all received Completions may optionally be handled as Unexpected Completions.\nThis issue will happen in following logs:\nUnable to handle kernel paging request at virtual address 00008800e0008010\nCPU 0 kworker/0:3(131): Oops 0\npc = [\u003cffffffff811bea5c\u003e]  ra = [\u003cffffffff81240844\u003e]  ps = 0000 Tainted: G        W\npc is at si_gpu_check_soft_reset+0x3c/0x240\nra is at si_dma_is_lockup+0x34/0xd0\nv0 = 0000000000000000  t0 = fff08800e0008010  t1 = 0000000000010000\nt2 = 0000000000008010  t3 = fff00007e3c00000  t4 = fff00007e3c00258\nt5 = 000000000000ffff  t6 = 0000000000000001  t7 = fff00007ef078000\ns0 = fff00007e3c016e8  s1 = fff00007e3c00000  s2 = fff00007e3c00018\ns3 = fff00007e3c00000  s4 = fff00007fff59d80  s5 = 0000000000000000\ns6 = fff00007ef07bd98\na0 = fff00007e3c00000  a1 = fff00007e3c016e8  a2 = 0000000000000008\na3 = 0000000000000001  a4 = 8f5c28f5c28f5c29  a5 = ffffffff810f4338\nt8 = 0000000000000275  t9 = ffffffff809b66f8  t10 = ff6769c5d964b800\nt11= 000000000000b886  pv = ffffffff811bea20  at = 0000000000000000\ngp = ffffffff81d89690  sp = 00000000aa814126\nDisabling lock debugging due to kernel taint\nTrace:\n[\u003cffffffff81240844\u003e] si_dma_is_lockup+0x34/0xd0\n[\u003cffffffff81119610\u003e] radeon_fence_check_lockup+0xd0/0x290\n[\u003cffffffff80977010\u003e] process_one_work+0x280/0x550\n[\u003cffffffff80977350\u003e] worker_thread+0x70/0x7c0\n[\u003cffffffff80977410\u003e] worker_thread+0x130/0x7c0\n[\u003cffffffff80982040\u003e] kthread+0x200/0x210\n[\u003cffffffff809772e0\u003e] worker_thread+0x0/0x7c0\n[\u003cffffffff80981f8c\u003e] kthread+0x14c/0x210\n[\u003cffffffff80911658\u003e] ret_from_kernel_thread+0x18/0x20\n[\u003cffffffff80981e40\u003e] kthread+0x0/0x210\n Code: ad3e0008  43f0074a  ad7e0018  ad9e0020  8c3001e8  40230101\n \u003c88210000\u003e 4821ed21\nSo force lockup work queue flush to fix this problem.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-48704",
          "url": "https://www.suse.com/security/cve/CVE-2022-48704"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223932 for CVE-2022-48704",
          "url": "https://bugzilla.suse.com/1223932"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T09:29:37Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-48704"
    },
    {
      "cve": "CVE-2023-2860",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-2860"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An out-of-bounds read vulnerability was found in the SR-IPv6 implementation in the Linux kernel. The flaw exists within the processing of seg6 attributes. The issue results from the improper validation of user-supplied data, which can result in a read past the end of an allocated buffer. This flaw allows a privileged local user to disclose sensitive information on affected installations of the Linux kernel.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-2860",
          "url": "https://www.suse.com/security/cve/CVE-2023-2860"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1211592 for CVE-2023-2860",
          "url": "https://bugzilla.suse.com/1211592"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T09:29:37Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-2860"
    },
    {
      "cve": "CVE-2023-52488",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-52488"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nserial: sc16is7xx: convert from _raw_ to _noinc_ regmap functions for FIFO\n\nThe SC16IS7XX IC supports a burst mode to access the FIFOs where the\ninitial register address is sent ($00), followed by all the FIFO data\nwithout having to resend the register address each time. In this mode, the\nIC doesn\u0027t increment the register address for each R/W byte.\n\nThe regmap_raw_read() and regmap_raw_write() are functions which can\nperform IO over multiple registers. They are currently used to read/write\nfrom/to the FIFO, and although they operate correctly in this burst mode on\nthe SPI bus, they would corrupt the regmap cache if it was not disabled\nmanually. The reason is that when the R/W size is more than 1 byte, these\nfunctions assume that the register address is incremented and handle the\ncache accordingly.\n\nConvert FIFO R/W functions to use the regmap _noinc_ versions in order to\nremove the manual cache control which was a workaround when using the\n_raw_ versions. FIFO registers are properly declared as volatile so\ncache will not be used/updated for FIFO accesses.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-52488",
          "url": "https://www.suse.com/security/cve/CVE-2023-52488"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1221162 for CVE-2023-52488",
          "url": "https://bugzilla.suse.com/1221162"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T09:29:37Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-52488"
    },
    {
      "cve": "CVE-2023-52503",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-52503"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntee: amdtee: fix use-after-free vulnerability in amdtee_close_session\n\nThere is a potential race condition in amdtee_close_session that may\ncause use-after-free in amdtee_open_session. For instance, if a session\nhas refcount == 1, and one thread tries to free this session via:\n\n    kref_put(\u0026sess-\u003erefcount, destroy_session);\n\nthe reference count will get decremented, and the next step would be to\ncall destroy_session(). However, if in another thread,\namdtee_open_session() is called before destroy_session() has completed\nexecution, alloc_session() may return \u0027sess\u0027 that will be freed up\nlater in destroy_session() leading to use-after-free in\namdtee_open_session.\n\nTo fix this issue, treat decrement of sess-\u003erefcount and removal of\n\u0027sess\u0027 from session list in destroy_session() as a critical section, so\nthat it is executed atomically.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-52503",
          "url": "https://www.suse.com/security/cve/CVE-2023-52503"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1220915 for CVE-2023-52503",
          "url": "https://bugzilla.suse.com/1220915"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T09:29:37Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-52503"
    },
    {
      "cve": "CVE-2023-52561",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-52561"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\narm64: dts: qcom: sdm845-db845c: Mark cont splash memory region as reserved\n\nAdding a reserved memory region for the framebuffer memory\n(the splash memory region set up by the bootloader).\n\nIt fixes a kernel panic (arm-smmu: Unhandled context fault\nat this particular memory region) reported on DB845c running\nv5.10.y.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-52561",
          "url": "https://www.suse.com/security/cve/CVE-2023-52561"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1220935 for CVE-2023-52561",
          "url": "https://bugzilla.suse.com/1220935"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T09:29:37Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-52561"
    },
    {
      "cve": "CVE-2023-52585",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-52585"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amdgpu: Fix possible NULL dereference in amdgpu_ras_query_error_status_helper()\n\nReturn invalid error code -EINVAL for invalid block id.\n\nFixes the below:\n\ndrivers/gpu/drm/amd/amdgpu/amdgpu_ras.c:1183 amdgpu_ras_query_error_status_helper() error: we previously assumed \u0027info\u0027 could be null (see line 1176)",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-52585",
          "url": "https://www.suse.com/security/cve/CVE-2023-52585"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1221080 for CVE-2023-52585",
          "url": "https://bugzilla.suse.com/1221080"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T09:29:37Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-52585"
    },
    {
      "cve": "CVE-2023-52589",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-52589"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: rkisp1: Fix IRQ disable race issue\n\nIn rkisp1_isp_stop() and rkisp1_csi_disable() the driver masks the\ninterrupts and then apparently assumes that the interrupt handler won\u0027t\nbe running, and proceeds in the stop procedure. This is not the case, as\nthe interrupt handler can already be running, which would lead to the\nISP being disabled while the interrupt handler handling a captured\nframe.\n\nThis brings up two issues: 1) the ISP could be powered off while the\ninterrupt handler is still running and accessing registers, leading to\nboard lockup, and 2) the interrupt handler code and the code that\ndisables the streaming might do things that conflict.\n\nIt is not clear to me if 2) causes a real issue, but 1) can be seen with\na suitable delay (or printk in my case) in the interrupt handler,\nleading to board lockup.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-52589",
          "url": "https://www.suse.com/security/cve/CVE-2023-52589"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1221084 for CVE-2023-52589",
          "url": "https://bugzilla.suse.com/1221084"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T09:29:37Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-52589"
    },
    {
      "cve": "CVE-2023-52590",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-52590"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nocfs2: Avoid touching renamed directory if parent does not change\n\nThe VFS will not be locking moved directory if its parent does not\nchange. Change ocfs2 rename code to avoid touching renamed directory if\nits parent does not change as without locking that can corrupt the\nfilesystem.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-52590",
          "url": "https://www.suse.com/security/cve/CVE-2023-52590"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1221088 for CVE-2023-52590",
          "url": "https://bugzilla.suse.com/1221088"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T09:29:37Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-52590"
    },
    {
      "cve": "CVE-2023-52591",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-52591"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nreiserfs: Avoid touching renamed directory if parent does not change\n\nThe VFS will not be locking moved directory if its parent does not\nchange. Change reiserfs rename code to avoid touching renamed directory\nif its parent does not change as without locking that can corrupt the\nfilesystem.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-52591",
          "url": "https://www.suse.com/security/cve/CVE-2023-52591"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1221044 for CVE-2023-52591",
          "url": "https://bugzilla.suse.com/1221044"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1221578 for CVE-2023-52591",
          "url": "https://bugzilla.suse.com/1221578"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1221598 for CVE-2023-52591",
          "url": "https://bugzilla.suse.com/1221598"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T09:29:37Z",
          "details": "important"
        }
      ],
      "title": "CVE-2023-52591"
    },
    {
      "cve": "CVE-2023-52593",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-52593"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: wfx: fix possible NULL pointer dereference in wfx_set_mfp_ap()\n\nSince \u0027ieee80211_beacon_get()\u0027 can return NULL, \u0027wfx_set_mfp_ap()\u0027\nshould check the return value before examining skb data. So convert\nthe latter to return an appropriate error code and propagate it to\nreturn from \u0027wfx_start_ap()\u0027 as well. Compile tested only.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-52593",
          "url": "https://www.suse.com/security/cve/CVE-2023-52593"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1221042 for CVE-2023-52593",
          "url": "https://bugzilla.suse.com/1221042"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T09:29:37Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-52593"
    },
    {
      "cve": "CVE-2023-52614",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-52614"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nPM / devfreq: Fix buffer overflow in trans_stat_show\n\nFix buffer overflow in trans_stat_show().\n\nConvert simple snprintf to the more secure scnprintf with size of\nPAGE_SIZE.\n\nAdd condition checking if we are exceeding PAGE_SIZE and exit early from\nloop. Also add at the end a warning that we exceeded PAGE_SIZE and that\nstats is disabled.\n\nReturn -EFBIG in the case where we don\u0027t have enough space to write the\nfull transition table.\n\nAlso document in the ABI that this function can return -EFBIG error.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-52614",
          "url": "https://www.suse.com/security/cve/CVE-2023-52614"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1221617 for CVE-2023-52614",
          "url": "https://bugzilla.suse.com/1221617"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T09:29:37Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-52614"
    },
    {
      "cve": "CVE-2023-52616",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-52616"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: lib/mpi - Fix unexpected pointer access in mpi_ec_init\n\nWhen the mpi_ec_ctx structure is initialized, some fields are not\ncleared, causing a crash when referencing the field when the\nstructure was released. Initially, this issue was ignored because\nmemory for mpi_ec_ctx is allocated with the __GFP_ZERO flag.\nFor example, this error will be triggered when calculating the\nZa value for SM2 separately.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-52616",
          "url": "https://www.suse.com/security/cve/CVE-2023-52616"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1221612 for CVE-2023-52616",
          "url": "https://bugzilla.suse.com/1221612"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T09:29:37Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-52616"
    },
    {
      "cve": "CVE-2023-52620",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-52620"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nf_tables: disallow timeout for anonymous sets\n\nNever used from userspace, disallow these parameters.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-52620",
          "url": "https://www.suse.com/security/cve/CVE-2023-52620"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1221825 for CVE-2023-52620",
          "url": "https://bugzilla.suse.com/1221825"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T09:29:37Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-52620"
    },
    {
      "cve": "CVE-2023-52627",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-52627"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\niio: adc: ad7091r: Allow users to configure device events\n\nAD7091R-5 devices are supported by the ad7091r-5 driver together with\nthe ad7091r-base driver. Those drivers declared iio events for notifying\nuser space when ADC readings fall bellow the thresholds of low limit\nregisters or above the values set in high limit registers.\nHowever, to configure iio events and their thresholds, a set of callback\nfunctions must be implemented and those were not present until now.\nThe consequence of trying to configure ad7091r-5 events without the\nproper callback functions was a null pointer dereference in the kernel\nbecause the pointers to the callback functions were not set.\n\nImplement event configuration callbacks allowing users to read/write\nevent thresholds and enable/disable event generation.\n\nSince the event spec structs are generic to AD7091R devices, also move\nthose from the ad7091r-5 driver the base driver so they can be reused\nwhen support for ad7091r-2/-4/-8 be added.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-52627",
          "url": "https://www.suse.com/security/cve/CVE-2023-52627"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222051 for CVE-2023-52627",
          "url": "https://bugzilla.suse.com/1222051"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T09:29:37Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-52627"
    },
    {
      "cve": "CVE-2023-52635",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-52635"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nPM / devfreq: Synchronize devfreq_monitor_[start/stop]\n\nThere is a chance if a frequent switch of the governor\ndone in a loop result in timer list corruption where\ntimer cancel being done from two place one from\ncancel_delayed_work_sync() and followed by expire_timers()\ncan be seen from the traces[1].\n\nwhile true\ndo\n        echo \"simple_ondemand\" \u003e /sys/class/devfreq/1d84000.ufshc/governor\n        echo \"performance\" \u003e /sys/class/devfreq/1d84000.ufshc/governor\ndone\n\nIt looks to be issue with devfreq driver where\ndevice_monitor_[start/stop] need to synchronized so that\ndelayed work should get corrupted while it is either\nbeing queued or running or being cancelled.\n\nLet\u0027s use polling flag and devfreq lock to synchronize the\nqueueing the timer instance twice and work data being\ncorrupted.\n\n[1]\n...\n..\n\u003cidle\u003e-0    [003]   9436.209662:  timer_cancel   timer=0xffffff80444f0428\n\u003cidle\u003e-0    [003]   9436.209664:  timer_expire_entry   timer=0xffffff80444f0428  now=0x10022da1c  function=__typeid__ZTSFvP10timer_listE_global_addr  baseclk=0x10022da1c\n\u003cidle\u003e-0    [003]   9436.209718:  timer_expire_exit   timer=0xffffff80444f0428\nkworker/u16:6-14217    [003]   9436.209863:  timer_start   timer=0xffffff80444f0428  function=__typeid__ZTSFvP10timer_listE_global_addr  expires=0x10022da2b  now=0x10022da1c  flags=182452227\nvendor.xxxyyy.ha-1593    [004]   9436.209888:  timer_cancel   timer=0xffffff80444f0428\nvendor.xxxyyy.ha-1593    [004]   9436.216390:  timer_init   timer=0xffffff80444f0428\nvendor.xxxyyy.ha-1593    [004]   9436.216392:  timer_start   timer=0xffffff80444f0428  function=__typeid__ZTSFvP10timer_listE_global_addr  expires=0x10022da2c  now=0x10022da1d  flags=186646532\nvendor.xxxyyy.ha-1593    [005]   9436.220992:  timer_cancel   timer=0xffffff80444f0428\nxxxyyyTraceManag-7795    [004]   9436.261641:  timer_cancel   timer=0xffffff80444f0428\n\n[2]\n\n 9436.261653][    C4] Unable to handle kernel paging request at virtual address dead00000000012a\n[ 9436.261664][    C4] Mem abort info:\n[ 9436.261666][    C4]   ESR = 0x96000044\n[ 9436.261669][    C4]   EC = 0x25: DABT (current EL), IL = 32 bits\n[ 9436.261671][    C4]   SET = 0, FnV = 0\n[ 9436.261673][    C4]   EA = 0, S1PTW = 0\n[ 9436.261675][    C4] Data abort info:\n[ 9436.261677][    C4]   ISV = 0, ISS = 0x00000044\n[ 9436.261680][    C4]   CM = 0, WnR = 1\n[ 9436.261682][    C4] [dead00000000012a] address between user and kernel address ranges\n[ 9436.261685][    C4] Internal error: Oops: 96000044 [#1] PREEMPT SMP\n[ 9436.261701][    C4] Skip md ftrace buffer dump for: 0x3a982d0\n...\n\n[ 9436.262138][    C4] CPU: 4 PID: 7795 Comm: TraceManag Tainted: G S      W  O      5.10.149-android12-9-o-g17f915d29d0c #1\n[ 9436.262141][    C4] Hardware name: Qualcomm Technologies, Inc.  (DT)\n[ 9436.262144][    C4] pstate: 22400085 (nzCv daIf +PAN -UAO +TCO BTYPE=--)\n[ 9436.262161][    C4] pc : expire_timers+0x9c/0x438\n[ 9436.262164][    C4] lr : expire_timers+0x2a4/0x438\n[ 9436.262168][    C4] sp : ffffffc010023dd0\n[ 9436.262171][    C4] x29: ffffffc010023df0 x28: ffffffd0636fdc18\n[ 9436.262178][    C4] x27: ffffffd063569dd0 x26: ffffffd063536008\n[ 9436.262182][    C4] x25: 0000000000000001 x24: ffffff88f7c69280\n[ 9436.262185][    C4] x23: 00000000000000e0 x22: dead000000000122\n[ 9436.262188][    C4] x21: 000000010022da29 x20: ffffff8af72b4e80\n[ 9436.262191][    C4] x19: ffffffc010023e50 x18: ffffffc010025038\n[ 9436.262195][    C4] x17: 0000000000000240 x16: 0000000000000201\n[ 9436.262199][    C4] x15: ffffffffffffffff x14: ffffff889f3c3100\n[ 9436.262203][    C4] x13: ffffff889f3c3100 x12: 00000000049f56b8\n[ 9436.262207][    C4] x11: 00000000049f56b8 x10: 00000000ffffffff\n[ 9436.262212][    C4] x9 : ffffffc010023e50 x8 : dead000000000122\n[ 9436.262216][    C4] x7 : ffffffffffffffff x6 : ffffffc0100239d8\n[ 9436.262220][    C4] x5 : 0000000000000000 x4 : 0000000000000101\n[ 9436.262223][    C4] x3 : 0000000000000080 x2 : ffffff8\n---truncated---",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-52635",
          "url": "https://www.suse.com/security/cve/CVE-2023-52635"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222294 for CVE-2023-52635",
          "url": "https://bugzilla.suse.com/1222294"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T09:29:37Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-52635"
    },
    {
      "cve": "CVE-2023-52636",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-52636"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nlibceph: just wait for more data to be available on the socket\n\nA short read may occur while reading the message footer from the\nsocket.  Later, when the socket is ready for another read, the\nmessenger invokes all read_partial_*() handlers, including\nread_partial_sparse_msg_data().  The expectation is that\nread_partial_sparse_msg_data() would bail, allowing the messenger to\ninvoke read_partial() for the footer and pick up where it left off.\n\nHowever read_partial_sparse_msg_data() violates that and ends up\ncalling into the state machine in the OSD client.  The sparse-read\nstate machine assumes that it\u0027s a new op and interprets some piece of\nthe footer as the sparse-read header and returns bogus extents/data\nlength, etc.\n\nTo determine whether read_partial_sparse_msg_data() should bail, let\u0027s\nreuse cursor-\u003etotal_resid.  Because once it reaches to zero that means\nall the extents and data have been successfully received in last read,\nelse it could break out when partially reading any of the extents and\ndata.  And then osd_sparse_read() could continue where it left off.\n\n[ idryomov: changelog ]",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-52636",
          "url": "https://www.suse.com/security/cve/CVE-2023-52636"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222247 for CVE-2023-52636",
          "url": "https://bugzilla.suse.com/1222247"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T09:29:37Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-52636"
    },
    {
      "cve": "CVE-2023-52645",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-52645"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\npmdomain: mediatek: fix race conditions with genpd\n\nIf the power domains are registered first with genpd and *after that*\nthe driver attempts to power them on in the probe sequence, then it is\npossible that a race condition occurs if genpd tries to power them on\nin the same time.\nThe same is valid for powering them off before unregistering them\nfrom genpd.\nAttempt to fix race conditions by first removing the domains from genpd\nand *after that* powering down domains.\nAlso first power up the domains and *after that* register them\nto genpd.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-52645",
          "url": "https://www.suse.com/security/cve/CVE-2023-52645"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223033 for CVE-2023-52645",
          "url": "https://bugzilla.suse.com/1223033"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T09:29:37Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-52645"
    },
    {
      "cve": "CVE-2023-52652",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-52652"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nNTB: fix possible name leak in ntb_register_device()\n\nIf device_register() fails in ntb_register_device(), the device name\nallocated by dev_set_name() should be freed. As per the comment in\ndevice_register(), callers should use put_device() to give up the\nreference in the error path. So fix this by calling put_device() in the\nerror path so that the name can be freed in kobject_cleanup().\n\nAs a result of this, put_device() in the error path of\nntb_register_device() is removed and the actual error is returned.\n\n[mani: reworded commit message]",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-52652",
          "url": "https://www.suse.com/security/cve/CVE-2023-52652"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223686 for CVE-2023-52652",
          "url": "https://bugzilla.suse.com/1223686"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T09:29:37Z",
          "details": "low"
        }
      ],
      "title": "CVE-2023-52652"
    },
    {
      "cve": "CVE-2023-6270",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-6270"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A flaw was found in the ATA over Ethernet (AoE) driver in the Linux kernel. The aoecmd_cfg_pkts() function improperly updates the refcnt on `struct net_device`, and a use-after-free can be triggered by racing between the free on the struct and the access through the `skbtxq` global queue. This could lead to a denial of service condition or potential code execution.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-6270",
          "url": "https://www.suse.com/security/cve/CVE-2023-6270"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1218562 for CVE-2023-6270",
          "url": "https://bugzilla.suse.com/1218562"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1218813 for CVE-2023-6270",
          "url": "https://bugzilla.suse.com/1218813"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1221578 for CVE-2023-6270",
          "url": "https://bugzilla.suse.com/1221578"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1221598 for CVE-2023-6270",
          "url": "https://bugzilla.suse.com/1221598"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223016 for CVE-2023-6270",
          "url": "https://bugzilla.suse.com/1223016"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1227675 for CVE-2023-6270",
          "url": "https://bugzilla.suse.com/1227675"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T09:29:37Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-6270"
    },
    {
      "cve": "CVE-2024-0639",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-0639"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A denial of service vulnerability due to a deadlock was found in sctp_auto_asconf_init in net/sctp/socket.c in the Linux kernel\u0027s SCTP subsystem. This flaw allows guests with local user privileges to trigger a deadlock and potentially crash the system.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-0639",
          "url": "https://www.suse.com/security/cve/CVE-2024-0639"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1218917 for CVE-2024-0639",
          "url": "https://bugzilla.suse.com/1218917"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T09:29:37Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-0639"
    },
    {
      "cve": "CVE-2024-0841",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-0841"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A null pointer dereference flaw was found in the hugetlbfs_fill_super function in the Linux kernel hugetlbfs (HugeTLB pages) functionality. This issue may allow a local user to crash the system or potentially escalate their privileges on the system.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-0841",
          "url": "https://www.suse.com/security/cve/CVE-2024-0841"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1219264 for CVE-2024-0841",
          "url": "https://bugzilla.suse.com/1219264"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T09:29:37Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-0841"
    },
    {
      "cve": "CVE-2024-22099",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-22099"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "NULL Pointer Dereference vulnerability in Linux Linux kernel kernel on Linux, x86, ARM (net, bluetooth modules) allows Overflow Buffers. This vulnerability is associated with program files /net/bluetooth/rfcomm/core.C.\n\nThis issue affects Linux kernel: v2.6.12-rc2.\n\n",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-22099",
          "url": "https://www.suse.com/security/cve/CVE-2024-22099"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1219170 for CVE-2024-22099",
          "url": "https://bugzilla.suse.com/1219170"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T09:29:37Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-22099"
    },
    {
      "cve": "CVE-2024-23307",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-23307"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Integer Overflow or Wraparound vulnerability in Linux Linux kernel kernel on Linux, x86, ARM (md, raid, raid5 modules) allows Forced Integer Overflow.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-23307",
          "url": "https://www.suse.com/security/cve/CVE-2024-23307"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1219169 for CVE-2024-23307",
          "url": "https://bugzilla.suse.com/1219169"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1220145 for CVE-2024-23307",
          "url": "https://bugzilla.suse.com/1220145"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T09:29:37Z",
          "details": "important"
        }
      ],
      "title": "CVE-2024-23307"
    },
    {
      "cve": "CVE-2024-23848",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-23848"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel through 6.7.1, there is a use-after-free in cec_queue_msg_fh, related to drivers/media/cec/core/cec-adap.c and drivers/media/cec/core/cec-api.c.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-23848",
          "url": "https://www.suse.com/security/cve/CVE-2024-23848"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1219104 for CVE-2024-23848",
          "url": "https://bugzilla.suse.com/1219104"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T09:29:37Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-23848"
    },
    {
      "cve": "CVE-2024-23850",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-23850"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In btrfs_get_root_ref in fs/btrfs/disk-io.c in the Linux kernel through 6.7.1, there can be an assertion failure and crash because a subvolume can be read out too soon after its root item is inserted upon subvolume creation.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-23850",
          "url": "https://www.suse.com/security/cve/CVE-2024-23850"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1219126 for CVE-2024-23850",
          "url": "https://bugzilla.suse.com/1219126"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T09:29:37Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-23850"
    },
    {
      "cve": "CVE-2024-26601",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26601"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\next4: regenerate buddy after block freeing failed if under fc replay\n\nThis mostly reverts commit 6bd97bf273bd (\"ext4: remove redundant\nmb_regenerate_buddy()\") and reintroduces mb_regenerate_buddy(). Based on\ncode in mb_free_blocks(), fast commit replay can end up marking as free\nblocks that are already marked as such. This causes corruption of the\nbuddy bitmap so we need to regenerate it in that case.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26601",
          "url": "https://www.suse.com/security/cve/CVE-2024-26601"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1220342 for CVE-2024-26601",
          "url": "https://bugzilla.suse.com/1220342"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T09:29:37Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26601"
    },
    {
      "cve": "CVE-2024-26610",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26610"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: iwlwifi: fix a memory corruption\n\niwl_fw_ini_trigger_tlv::data is a pointer to a __le32, which means that\nif we copy to iwl_fw_ini_trigger_tlv::data + offset while offset is in\nbytes, we\u0027ll write past the buffer.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26610",
          "url": "https://www.suse.com/security/cve/CVE-2024-26610"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1221299 for CVE-2024-26610",
          "url": "https://bugzilla.suse.com/1221299"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1221302 for CVE-2024-26610",
          "url": "https://bugzilla.suse.com/1221302"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T09:29:37Z",
          "details": "important"
        }
      ],
      "title": "CVE-2024-26610"
    },
    {
      "cve": "CVE-2024-26656",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26656"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amdgpu: fix use-after-free bug\n\nThe bug can be triggered by sending a single amdgpu_gem_userptr_ioctl\nto the AMDGPU DRM driver on any ASICs with an invalid address and size.\nThe bug was reported by Joonkyo Jung \u003cjoonkyoj@yonsei.ac.kr\u003e.\nFor example the following code:\n\nstatic void Syzkaller1(int fd)\n{\n\tstruct drm_amdgpu_gem_userptr arg;\n\tint ret;\n\n\targ.addr = 0xffffffffffff0000;\n\targ.size = 0x80000000; /*2 Gb*/\n\targ.flags = 0x7;\n\tret = drmIoctl(fd, 0xc1186451/*amdgpu_gem_userptr_ioctl*/, \u0026arg);\n}\n\nDue to the address and size are not valid there is a failure in\namdgpu_hmm_register-\u003emmu_interval_notifier_insert-\u003e__mmu_interval_notifier_insert-\u003e\ncheck_shl_overflow, but we even the amdgpu_hmm_register failure we still call\namdgpu_hmm_unregister into  amdgpu_gem_object_free which causes access to a bad address.\nThe following stack is below when the issue is reproduced when Kazan is enabled:\n\n[  +0.000014] Hardware name: ASUS System Product Name/ROG STRIX B550-F GAMING (WI-FI), BIOS 1401 12/03/2020\n[  +0.000009] RIP: 0010:mmu_interval_notifier_remove+0x327/0x340\n[  +0.000017] Code: ff ff 49 89 44 24 08 48 b8 00 01 00 00 00 00 ad de 4c 89 f7 49 89 47 40 48 83 c0 22 49 89 47 48 e8 ce d1 2d 01 e9 32 ff ff ff \u003c0f\u003e 0b e9 16 ff ff ff 4c 89 ef e8 fa 14 b3 ff e9 36 ff ff ff e8 80\n[  +0.000014] RSP: 0018:ffffc90002657988 EFLAGS: 00010246\n[  +0.000013] RAX: 0000000000000000 RBX: 1ffff920004caf35 RCX: ffffffff8160565b\n[  +0.000011] RDX: dffffc0000000000 RSI: 0000000000000004 RDI: ffff8881a9f78260\n[  +0.000010] RBP: ffffc90002657a70 R08: 0000000000000001 R09: fffff520004caf25\n[  +0.000010] R10: 0000000000000003 R11: ffffffff8161d1d6 R12: ffff88810e988c00\n[  +0.000010] R13: ffff888126fb5a00 R14: ffff88810e988c0c R15: ffff8881a9f78260\n[  +0.000011] FS:  00007ff9ec848540(0000) GS:ffff8883cc880000(0000) knlGS:0000000000000000\n[  +0.000012] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[  +0.000010] CR2: 000055b3f7e14328 CR3: 00000001b5770000 CR4: 0000000000350ef0\n[  +0.000010] Call Trace:\n[  +0.000006]  \u003cTASK\u003e\n[  +0.000007]  ? show_regs+0x6a/0x80\n[  +0.000018]  ? __warn+0xa5/0x1b0\n[  +0.000019]  ? mmu_interval_notifier_remove+0x327/0x340\n[  +0.000018]  ? report_bug+0x24a/0x290\n[  +0.000022]  ? handle_bug+0x46/0x90\n[  +0.000015]  ? exc_invalid_op+0x19/0x50\n[  +0.000016]  ? asm_exc_invalid_op+0x1b/0x20\n[  +0.000017]  ? kasan_save_stack+0x26/0x50\n[  +0.000017]  ? mmu_interval_notifier_remove+0x23b/0x340\n[  +0.000019]  ? mmu_interval_notifier_remove+0x327/0x340\n[  +0.000019]  ? mmu_interval_notifier_remove+0x23b/0x340\n[  +0.000020]  ? __pfx_mmu_interval_notifier_remove+0x10/0x10\n[  +0.000017]  ? kasan_save_alloc_info+0x1e/0x30\n[  +0.000018]  ? srso_return_thunk+0x5/0x5f\n[  +0.000014]  ? __kasan_kmalloc+0xb1/0xc0\n[  +0.000018]  ? srso_return_thunk+0x5/0x5f\n[  +0.000013]  ? __kasan_check_read+0x11/0x20\n[  +0.000020]  amdgpu_hmm_unregister+0x34/0x50 [amdgpu]\n[  +0.004695]  amdgpu_gem_object_free+0x66/0xa0 [amdgpu]\n[  +0.004534]  ? __pfx_amdgpu_gem_object_free+0x10/0x10 [amdgpu]\n[  +0.004291]  ? do_syscall_64+0x5f/0xe0\n[  +0.000023]  ? srso_return_thunk+0x5/0x5f\n[  +0.000017]  drm_gem_object_free+0x3b/0x50 [drm]\n[  +0.000489]  amdgpu_gem_userptr_ioctl+0x306/0x500 [amdgpu]\n[  +0.004295]  ? __pfx_amdgpu_gem_userptr_ioctl+0x10/0x10 [amdgpu]\n[  +0.004270]  ? srso_return_thunk+0x5/0x5f\n[  +0.000014]  ? __this_cpu_preempt_check+0x13/0x20\n[  +0.000015]  ? srso_return_thunk+0x5/0x5f\n[  +0.000013]  ? sysvec_apic_timer_interrupt+0x57/0xc0\n[  +0.000020]  ? srso_return_thunk+0x5/0x5f\n[  +0.000014]  ? asm_sysvec_apic_timer_interrupt+0x1b/0x20\n[  +0.000022]  ? drm_ioctl_kernel+0x17b/0x1f0 [drm]\n[  +0.000496]  ? __pfx_amdgpu_gem_userptr_ioctl+0x10/0x10 [amdgpu]\n[  +0.004272]  ? drm_ioctl_kernel+0x190/0x1f0 [drm]\n[  +0.000492]  drm_ioctl_kernel+0x140/0x1f0 [drm]\n[  +0.000497]  ? __pfx_amdgpu_gem_userptr_ioctl+0x10/0x10 [amdgpu]\n[  +0.004297]  ? __pfx_drm_ioctl_kernel+0x10/0x10 [d\n---truncated---",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26656",
          "url": "https://www.suse.com/security/cve/CVE-2024-26656"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222307 for CVE-2024-26656",
          "url": "https://bugzilla.suse.com/1222307"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T09:29:37Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26656"
    },
    {
      "cve": "CVE-2024-26660",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26660"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/display: Implement bounds check for stream encoder creation in DCN301\n\n\u0027stream_enc_regs\u0027 array is an array of dcn10_stream_enc_registers\nstructures. The array is initialized with four elements, corresponding\nto the four calls to stream_enc_regs() in the array initializer. This\nmeans that valid indices for this array are 0, 1, 2, and 3.\n\nThe error message \u0027stream_enc_regs\u0027 4 \u003c= 5 below, is indicating that\nthere is an attempt to access this array with an index of 5, which is\nout of bounds. This could lead to undefined behavior\n\nHere, eng_id is used as an index to access the stream_enc_regs array. If\neng_id is 5, this would result in an out-of-bounds access on the\nstream_enc_regs array.\n\nThus fixing Buffer overflow error in dcn301_stream_encoder_create\nreported by Smatch:\ndrivers/gpu/drm/amd/amdgpu/../display/dc/resource/dcn301/dcn301_resource.c:1011 dcn301_stream_encoder_create() error: buffer overflow \u0027stream_enc_regs\u0027 4 \u003c= 5",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26660",
          "url": "https://www.suse.com/security/cve/CVE-2024-26660"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222266 for CVE-2024-26660",
          "url": "https://bugzilla.suse.com/1222266"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T09:29:37Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26660"
    },
    {
      "cve": "CVE-2024-26671",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26671"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nblk-mq: fix IO hang from sbitmap wakeup race\n\nIn blk_mq_mark_tag_wait(), __add_wait_queue() may be re-ordered\nwith the following blk_mq_get_driver_tag() in case of getting driver\ntag failure.\n\nThen in __sbitmap_queue_wake_up(), waitqueue_active() may not observe\nthe added waiter in blk_mq_mark_tag_wait() and wake up nothing, meantime\nblk_mq_mark_tag_wait() can\u0027t get driver tag successfully.\n\nThis issue can be reproduced by running the following test in loop, and\nfio hang can be observed in \u003c 30min when running it on my test VM\nin laptop.\n\n\tmodprobe -r scsi_debug\n\tmodprobe scsi_debug delay=0 dev_size_mb=4096 max_queue=1 host_max_queue=1 submit_queues=4\n\tdev=`ls -d /sys/bus/pseudo/drivers/scsi_debug/adapter*/host*/target*/*/block/* | head -1 | xargs basename`\n\tfio --filename=/dev/\"$dev\" --direct=1 --rw=randrw --bs=4k --iodepth=1 \\\n       \t\t--runtime=100 --numjobs=40 --time_based --name=test \\\n        \t--ioengine=libaio\n\nFix the issue by adding one explicit barrier in blk_mq_mark_tag_wait(), which\nis just fine in case of running out of tag.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26671",
          "url": "https://www.suse.com/security/cve/CVE-2024-26671"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222357 for CVE-2024-26671",
          "url": "https://bugzilla.suse.com/1222357"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T09:29:37Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26671"
    },
    {
      "cve": "CVE-2024-26673",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26673"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nft_ct: sanitize layer 3 and 4 protocol number in custom expectations\n\n- Disallow families other than NFPROTO_{IPV4,IPV6,INET}.\n- Disallow layer 4 protocol with no ports, since destination port is a\n  mandatory attribute for this object.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26673",
          "url": "https://www.suse.com/security/cve/CVE-2024-26673"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222368 for CVE-2024-26673",
          "url": "https://bugzilla.suse.com/1222368"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T09:29:37Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26673"
    },
    {
      "cve": "CVE-2024-26675",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26675"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nppp_async: limit MRU to 64K\n\nsyzbot triggered a warning [1] in __alloc_pages():\n\nWARN_ON_ONCE_GFP(order \u003e MAX_PAGE_ORDER, gfp)\n\nWillem fixed a similar issue in commit c0a2a1b0d631 (\"ppp: limit MRU to 64K\")\n\nAdopt the same sanity check for ppp_async_ioctl(PPPIOCSMRU)\n\n[1]:\n\n WARNING: CPU: 1 PID: 11 at mm/page_alloc.c:4543 __alloc_pages+0x308/0x698 mm/page_alloc.c:4543\nModules linked in:\nCPU: 1 PID: 11 Comm: kworker/u4:0 Not tainted 6.8.0-rc2-syzkaller-g41bccc98fb79 #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023\nWorkqueue: events_unbound flush_to_ldisc\npstate: 204000c5 (nzCv daIF +PAN -UAO -TCO -DIT -SSBS BTYPE=--)\n pc : __alloc_pages+0x308/0x698 mm/page_alloc.c:4543\n lr : __alloc_pages+0xc8/0x698 mm/page_alloc.c:4537\nsp : ffff800093967580\nx29: ffff800093967660 x28: ffff8000939675a0 x27: dfff800000000000\nx26: ffff70001272ceb4 x25: 0000000000000000 x24: ffff8000939675c0\nx23: 0000000000000000 x22: 0000000000060820 x21: 1ffff0001272ceb8\nx20: ffff8000939675e0 x19: 0000000000000010 x18: ffff800093967120\nx17: ffff800083bded5c x16: ffff80008ac97500 x15: 0000000000000005\nx14: 1ffff0001272cebc x13: 0000000000000000 x12: 0000000000000000\nx11: ffff70001272cec1 x10: 1ffff0001272cec0 x9 : 0000000000000001\nx8 : ffff800091c91000 x7 : 0000000000000000 x6 : 000000000000003f\nx5 : 00000000ffffffff x4 : 0000000000000000 x3 : 0000000000000020\nx2 : 0000000000000008 x1 : 0000000000000000 x0 : ffff8000939675e0\nCall trace:\n  __alloc_pages+0x308/0x698 mm/page_alloc.c:4543\n  __alloc_pages_node include/linux/gfp.h:238 [inline]\n  alloc_pages_node include/linux/gfp.h:261 [inline]\n  __kmalloc_large_node+0xbc/0x1fc mm/slub.c:3926\n  __do_kmalloc_node mm/slub.c:3969 [inline]\n  __kmalloc_node_track_caller+0x418/0x620 mm/slub.c:4001\n  kmalloc_reserve+0x17c/0x23c net/core/skbuff.c:590\n  __alloc_skb+0x1c8/0x3d8 net/core/skbuff.c:651\n  __netdev_alloc_skb+0xb8/0x3e8 net/core/skbuff.c:715\n  netdev_alloc_skb include/linux/skbuff.h:3235 [inline]\n  dev_alloc_skb include/linux/skbuff.h:3248 [inline]\n  ppp_async_input drivers/net/ppp/ppp_async.c:863 [inline]\n  ppp_asynctty_receive+0x588/0x186c drivers/net/ppp/ppp_async.c:341\n  tty_ldisc_receive_buf+0x12c/0x15c drivers/tty/tty_buffer.c:390\n  tty_port_default_receive_buf+0x74/0xac drivers/tty/tty_port.c:37\n  receive_buf drivers/tty/tty_buffer.c:444 [inline]\n  flush_to_ldisc+0x284/0x6e4 drivers/tty/tty_buffer.c:494\n  process_one_work+0x694/0x1204 kernel/workqueue.c:2633\n  process_scheduled_works kernel/workqueue.c:2706 [inline]\n  worker_thread+0x938/0xef4 kernel/workqueue.c:2787\n  kthread+0x288/0x310 kernel/kthread.c:388\n  ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:860",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26675",
          "url": "https://www.suse.com/security/cve/CVE-2024-26675"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222379 for CVE-2024-26675",
          "url": "https://bugzilla.suse.com/1222379"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T09:29:37Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26675"
    },
    {
      "cve": "CVE-2024-26680",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26680"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: atlantic: Fix DMA mapping for PTP hwts ring\n\nFunction aq_ring_hwts_rx_alloc() maps extra AQ_CFG_RXDS_DEF bytes\nfor PTP HWTS ring but then generic aq_ring_free() does not take this\ninto account.\nCreate and use a specific function to free HWTS ring to fix this\nissue.\n\nTrace:\n[  215.351607] ------------[ cut here ]------------\n[  215.351612] DMA-API: atlantic 0000:4b:00.0: device driver frees DMA memory with different size [device address=0x00000000fbdd0000] [map size=34816 bytes] [unmap size=32768 bytes]\n[  215.351635] WARNING: CPU: 33 PID: 10759 at kernel/dma/debug.c:988 check_unmap+0xa6f/0x2360\n...\n[  215.581176] Call Trace:\n[  215.583632]  \u003cTASK\u003e\n[  215.585745]  ? show_trace_log_lvl+0x1c4/0x2df\n[  215.590114]  ? show_trace_log_lvl+0x1c4/0x2df\n[  215.594497]  ? debug_dma_free_coherent+0x196/0x210\n[  215.599305]  ? check_unmap+0xa6f/0x2360\n[  215.603147]  ? __warn+0xca/0x1d0\n[  215.606391]  ? check_unmap+0xa6f/0x2360\n[  215.610237]  ? report_bug+0x1ef/0x370\n[  215.613921]  ? handle_bug+0x3c/0x70\n[  215.617423]  ? exc_invalid_op+0x14/0x50\n[  215.621269]  ? asm_exc_invalid_op+0x16/0x20\n[  215.625480]  ? check_unmap+0xa6f/0x2360\n[  215.629331]  ? mark_lock.part.0+0xca/0xa40\n[  215.633445]  debug_dma_free_coherent+0x196/0x210\n[  215.638079]  ? __pfx_debug_dma_free_coherent+0x10/0x10\n[  215.643242]  ? slab_free_freelist_hook+0x11d/0x1d0\n[  215.648060]  dma_free_attrs+0x6d/0x130\n[  215.651834]  aq_ring_free+0x193/0x290 [atlantic]\n[  215.656487]  aq_ptp_ring_free+0x67/0x110 [atlantic]\n...\n[  216.127540] ---[ end trace 6467e5964dd2640b ]---\n[  216.132160] DMA-API: Mapped at:\n[  216.132162]  debug_dma_alloc_coherent+0x66/0x2f0\n[  216.132165]  dma_alloc_attrs+0xf5/0x1b0\n[  216.132168]  aq_ring_hwts_rx_alloc+0x150/0x1f0 [atlantic]\n[  216.132193]  aq_ptp_ring_alloc+0x1bb/0x540 [atlantic]\n[  216.132213]  aq_nic_init+0x4a1/0x760 [atlantic]",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26680",
          "url": "https://www.suse.com/security/cve/CVE-2024-26680"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222427 for CVE-2024-26680",
          "url": "https://bugzilla.suse.com/1222427"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T09:29:37Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26680"
    },
    {
      "cve": "CVE-2024-26681",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26681"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetdevsim: avoid potential loop in nsim_dev_trap_report_work()\n\nMany syzbot reports include the following trace [1]\n\nIf nsim_dev_trap_report_work() can not grab the mutex,\nit should rearm itself at least one jiffie later.\n\n[1]\nSending NMI from CPU 1 to CPUs 0:\nNMI backtrace for cpu 0\nCPU: 0 PID: 32383 Comm: kworker/0:2 Not tainted 6.8.0-rc2-syzkaller-00031-g861c0981648f #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023\nWorkqueue: events nsim_dev_trap_report_work\n RIP: 0010:bytes_is_nonzero mm/kasan/generic.c:89 [inline]\n RIP: 0010:memory_is_nonzero mm/kasan/generic.c:104 [inline]\n RIP: 0010:memory_is_poisoned_n mm/kasan/generic.c:129 [inline]\n RIP: 0010:memory_is_poisoned mm/kasan/generic.c:161 [inline]\n RIP: 0010:check_region_inline mm/kasan/generic.c:180 [inline]\n RIP: 0010:kasan_check_range+0x101/0x190 mm/kasan/generic.c:189\nCode: 07 49 39 d1 75 0a 45 3a 11 b8 01 00 00 00 7c 0b 44 89 c2 e8 21 ed ff ff 83 f0 01 5b 5d 41 5c c3 48 85 d2 74 4f 48 01 ea eb 09 \u003c48\u003e 83 c0 01 48 39 d0 74 41 80 38 00 74 f2 eb b6 41 bc 08 00 00 00\nRSP: 0018:ffffc90012dcf998 EFLAGS: 00000046\nRAX: fffffbfff258af1e RBX: fffffbfff258af1f RCX: ffffffff8168eda3\nRDX: fffffbfff258af1f RSI: 0000000000000004 RDI: ffffffff92c578f0\nRBP: fffffbfff258af1e R08: 0000000000000000 R09: fffffbfff258af1e\nR10: ffffffff92c578f3 R11: ffffffff8acbcbc0 R12: 0000000000000002\nR13: ffff88806db38400 R14: 1ffff920025b9f42 R15: ffffffff92c578e8\nFS:  0000000000000000(0000) GS:ffff8880b9800000(0000) knlGS:0000000000000000\nCS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 000000c00994e078 CR3: 000000002c250000 CR4: 00000000003506f0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\nCall Trace:\n \u003cNMI\u003e\n \u003c/NMI\u003e\n \u003cTASK\u003e\n  instrument_atomic_read include/linux/instrumented.h:68 [inline]\n  atomic_read include/linux/atomic/atomic-instrumented.h:32 [inline]\n  queued_spin_is_locked include/asm-generic/qspinlock.h:57 [inline]\n  debug_spin_unlock kernel/locking/spinlock_debug.c:101 [inline]\n  do_raw_spin_unlock+0x53/0x230 kernel/locking/spinlock_debug.c:141\n  __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:150 [inline]\n  _raw_spin_unlock_irqrestore+0x22/0x70 kernel/locking/spinlock.c:194\n  debug_object_activate+0x349/0x540 lib/debugobjects.c:726\n  debug_work_activate kernel/workqueue.c:578 [inline]\n  insert_work+0x30/0x230 kernel/workqueue.c:1650\n  __queue_work+0x62e/0x11d0 kernel/workqueue.c:1802\n  __queue_delayed_work+0x1bf/0x270 kernel/workqueue.c:1953\n  queue_delayed_work_on+0x106/0x130 kernel/workqueue.c:1989\n  queue_delayed_work include/linux/workqueue.h:563 [inline]\n  schedule_delayed_work include/linux/workqueue.h:677 [inline]\n  nsim_dev_trap_report_work+0x9c0/0xc80 drivers/net/netdevsim/dev.c:842\n  process_one_work+0x886/0x15d0 kernel/workqueue.c:2633\n  process_scheduled_works kernel/workqueue.c:2706 [inline]\n  worker_thread+0x8b9/0x1290 kernel/workqueue.c:2787\n  kthread+0x2c6/0x3a0 kernel/kthread.c:388\n  ret_from_fork+0x45/0x80 arch/x86/kernel/process.c:147\n  ret_from_fork_asm+0x11/0x20 arch/x86/entry/entry_64.S:242\n \u003c/TASK\u003e",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26681",
          "url": "https://www.suse.com/security/cve/CVE-2024-26681"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222431 for CVE-2024-26681",
          "url": "https://bugzilla.suse.com/1222431"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T09:29:37Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26681"
    },
    {
      "cve": "CVE-2024-26684",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26684"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: stmmac: xgmac: fix handling of DPP safety error for DMA channels\n\nCommit 56e58d6c8a56 (\"net: stmmac: Implement Safety Features in\nXGMAC core\") checks and reports safety errors, but leaves the\nData Path Parity Errors for each channel in DMA unhandled at all, lead to\na storm of interrupt.\nFix it by checking and clearing the DMA_DPP_Interrupt_Status register.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26684",
          "url": "https://www.suse.com/security/cve/CVE-2024-26684"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222445 for CVE-2024-26684",
          "url": "https://bugzilla.suse.com/1222445"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T09:29:37Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26684"
    },
    {
      "cve": "CVE-2024-26685",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26685"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnilfs2: fix potential bug in end_buffer_async_write\n\nAccording to a syzbot report, end_buffer_async_write(), which handles the\ncompletion of block device writes, may detect abnormal condition of the\nbuffer async_write flag and cause a BUG_ON failure when using nilfs2.\n\nNilfs2 itself does not use end_buffer_async_write().  But, the async_write\nflag is now used as a marker by commit 7f42ec394156 (\"nilfs2: fix issue\nwith race condition of competition between segments for dirty blocks\") as\na means of resolving double list insertion of dirty blocks in\nnilfs_lookup_dirty_data_buffers() and nilfs_lookup_node_buffers() and the\nresulting crash.\n\nThis modification is safe as long as it is used for file data and b-tree\nnode blocks where the page caches are independent.  However, it was\nirrelevant and redundant to also introduce async_write for segment summary\nand super root blocks that share buffers with the backing device.  This\nled to the possibility that the BUG_ON check in end_buffer_async_write\nwould fail as described above, if independent writebacks of the backing\ndevice occurred in parallel.\n\nThe use of async_write for segment summary buffers has already been\nremoved in a previous change.\n\nFix this issue by removing the manipulation of the async_write flag for\nthe remaining super root block buffer.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26685",
          "url": "https://www.suse.com/security/cve/CVE-2024-26685"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222437 for CVE-2024-26685",
          "url": "https://bugzilla.suse.com/1222437"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T09:29:37Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26685"
    },
    {
      "cve": "CVE-2024-26687",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26687"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nxen/events: close evtchn after mapping cleanup\n\nshutdown_pirq and startup_pirq are not taking the\nirq_mapping_update_lock because they can\u0027t due to lock inversion. Both\nare called with the irq_desc-\u003elock being taking. The lock order,\nhowever, is first irq_mapping_update_lock and then irq_desc-\u003elock.\n\nThis opens multiple races:\n- shutdown_pirq can be interrupted by a function that allocates an event\n  channel:\n\n  CPU0                        CPU1\n  shutdown_pirq {\n    xen_evtchn_close(e)\n                              __startup_pirq {\n                                EVTCHNOP_bind_pirq\n                                  -\u003e returns just freed evtchn e\n                                set_evtchn_to_irq(e, irq)\n                              }\n    xen_irq_info_cleanup() {\n      set_evtchn_to_irq(e, -1)\n    }\n  }\n\n  Assume here event channel e refers here to the same event channel\n  number.\n  After this race the evtchn_to_irq mapping for e is invalid (-1).\n\n- __startup_pirq races with __unbind_from_irq in a similar way. Because\n  __startup_pirq doesn\u0027t take irq_mapping_update_lock it can grab the\n  evtchn that __unbind_from_irq is currently freeing and cleaning up. In\n  this case even though the event channel is allocated, its mapping can\n  be unset in evtchn_to_irq.\n\nThe fix is to first cleanup the mappings and then close the event\nchannel. In this way, when an event channel gets allocated it\u0027s\npotential previous evtchn_to_irq mappings are guaranteed to be unset already.\nThis is also the reverse order of the allocation where first the event\nchannel is allocated and then the mappings are setup.\n\nOn a 5.10 kernel prior to commit 3fcdaf3d7634 (\"xen/events: modify internal\n[un]bind interfaces\"), we hit a BUG like the following during probing of NVMe\ndevices. The issue is that during nvme_setup_io_queues, pci_free_irq\nis called for every device which results in a call to shutdown_pirq.\nWith many nvme devices it\u0027s therefore likely to hit this race during\nboot because there will be multiple calls to shutdown_pirq and\nstartup_pirq are running potentially in parallel.\n\n  ------------[ cut here ]------------\n  blkfront: xvda: barrier or flush: disabled; persistent grants: enabled; indirect descriptors: enabled; bounce buffer: enabled\n  kernel BUG at drivers/xen/events/events_base.c:499!\n  invalid opcode: 0000 [#1] SMP PTI\n  CPU: 44 PID: 375 Comm: kworker/u257:23 Not tainted 5.10.201-191.748.amzn2.x86_64 #1\n  Hardware name: Xen HVM domU, BIOS 4.11.amazon 08/24/2006\n  Workqueue: nvme-reset-wq nvme_reset_work\n  RIP: 0010:bind_evtchn_to_cpu+0xdf/0xf0\n  Code: 5d 41 5e c3 cc cc cc cc 44 89 f7 e8 2b 55 ad ff 49 89 c5 48 85 c0 0f 84 64 ff ff ff 4c 8b 68 30 41 83 fe ff 0f 85 60 ff ff ff \u003c0f\u003e 0b 66 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 0f 1f 44 00 00\n  RSP: 0000:ffffc9000d533b08 EFLAGS: 00010046\n  RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000006\n  RDX: 0000000000000028 RSI: 00000000ffffffff RDI: 00000000ffffffff\n  RBP: ffff888107419680 R08: 0000000000000000 R09: ffffffff82d72b00\n  R10: 0000000000000000 R11: 0000000000000000 R12: 00000000000001ed\n  R13: 0000000000000000 R14: 00000000ffffffff R15: 0000000000000002\n  FS:  0000000000000000(0000) GS:ffff88bc8b500000(0000) knlGS:0000000000000000\n  CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n  CR2: 0000000000000000 CR3: 0000000002610001 CR4: 00000000001706e0\n  DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n  DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\n  Call Trace:\n   ? show_trace_log_lvl+0x1c1/0x2d9\n   ? show_trace_log_lvl+0x1c1/0x2d9\n   ? set_affinity_irq+0xdc/0x1c0\n   ? __die_body.cold+0x8/0xd\n   ? die+0x2b/0x50\n   ? do_trap+0x90/0x110\n   ? bind_evtchn_to_cpu+0xdf/0xf0\n   ? do_error_trap+0x65/0x80\n   ? bind_evtchn_to_cpu+0xdf/0xf0\n   ? exc_invalid_op+0x4e/0x70\n   ? bind_evtchn_to_cpu+0xdf/0xf0\n   ? asm_exc_invalid_op+0x12/0x20\n   ? bind_evtchn_to_cpu+0xdf/0x\n---truncated---",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26687",
          "url": "https://www.suse.com/security/cve/CVE-2024-26687"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222435 for CVE-2024-26687",
          "url": "https://bugzilla.suse.com/1222435"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T09:29:37Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26687"
    },
    {
      "cve": "CVE-2024-26688",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26688"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfs,hugetlb: fix NULL pointer dereference in hugetlbs_fill_super\n\nWhen configuring a hugetlb filesystem via the fsconfig() syscall, there is\na possible NULL dereference in hugetlbfs_fill_super() caused by assigning\nNULL to ctx-\u003ehstate in hugetlbfs_parse_param() when the requested pagesize\nis non valid.\n\nE.g: Taking the following steps:\n\n     fd = fsopen(\"hugetlbfs\", FSOPEN_CLOEXEC);\n     fsconfig(fd, FSCONFIG_SET_STRING, \"pagesize\", \"1024\", 0);\n     fsconfig(fd, FSCONFIG_CMD_CREATE, NULL, NULL, 0);\n\nGiven that the requested \"pagesize\" is invalid, ctxt-\u003ehstate will be replaced\nwith NULL, losing its previous value, and we will print an error:\n\n ...\n ...\n case Opt_pagesize:\n ps = memparse(param-\u003estring, \u0026rest);\n ctx-\u003ehstate = h;\n if (!ctx-\u003ehstate) {\n         pr_err(\"Unsupported page size %lu MB\\n\", ps / SZ_1M);\n         return -EINVAL;\n }\n return 0;\n ...\n ...\n\nThis is a problem because later on, we will dereference ctxt-\u003ehstate in\nhugetlbfs_fill_super()\n\n ...\n ...\n sb-\u003es_blocksize = huge_page_size(ctx-\u003ehstate);\n ...\n ...\n\nCausing below Oops.\n\nFix this by replacing cxt-\u003ehstate value only when then pagesize is known\nto be valid.\n\n kernel: hugetlbfs: Unsupported page size 0 MB\n kernel: BUG: kernel NULL pointer dereference, address: 0000000000000028\n kernel: #PF: supervisor read access in kernel mode\n kernel: #PF: error_code(0x0000) - not-present page\n kernel: PGD 800000010f66c067 P4D 800000010f66c067 PUD 1b22f8067 PMD 0\n kernel: Oops: 0000 [#1] PREEMPT SMP PTI\n kernel: CPU: 4 PID: 5659 Comm: syscall Tainted: G            E      6.8.0-rc2-default+ #22 5a47c3fef76212addcc6eb71344aabc35190ae8f\n kernel: Hardware name: Intel Corp. GROVEPORT/GROVEPORT, BIOS GVPRCRB1.86B.0016.D04.1705030402 05/03/2017\n kernel: RIP: 0010:hugetlbfs_fill_super+0xb4/0x1a0\n kernel: Code: 48 8b 3b e8 3e c6 ed ff 48 85 c0 48 89 45 20 0f 84 d6 00 00 00 48 b8 ff ff ff ff ff ff ff 7f 4c 89 e7 49 89 44 24 20 48 8b 03 \u003c8b\u003e 48 28 b8 00 10 00 00 48 d3 e0 49 89 44 24 18 48 8b 03 8b 40 28\n kernel: RSP: 0018:ffffbe9960fcbd48 EFLAGS: 00010246\n kernel: RAX: 0000000000000000 RBX: ffff9af5272ae780 RCX: 0000000000372004\n kernel: RDX: ffffffffffffffff RSI: ffffffffffffffff RDI: ffff9af555e9b000\n kernel: RBP: ffff9af52ee66b00 R08: 0000000000000040 R09: 0000000000370004\n kernel: R10: ffffbe9960fcbd48 R11: 0000000000000040 R12: ffff9af555e9b000\n kernel: R13: ffffffffa66b86c0 R14: ffff9af507d2f400 R15: ffff9af507d2f400\n kernel: FS:  00007ffbc0ba4740(0000) GS:ffff9b0bd7000000(0000) knlGS:0000000000000000\n kernel: CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n kernel: CR2: 0000000000000028 CR3: 00000001b1ee0000 CR4: 00000000001506f0\n kernel: Call Trace:\n kernel:  \u003cTASK\u003e\n kernel:  ? __die_body+0x1a/0x60\n kernel:  ? page_fault_oops+0x16f/0x4a0\n kernel:  ? search_bpf_extables+0x65/0x70\n kernel:  ? fixup_exception+0x22/0x310\n kernel:  ? exc_page_fault+0x69/0x150\n kernel:  ? asm_exc_page_fault+0x22/0x30\n kernel:  ? __pfx_hugetlbfs_fill_super+0x10/0x10\n kernel:  ? hugetlbfs_fill_super+0xb4/0x1a0\n kernel:  ? hugetlbfs_fill_super+0x28/0x1a0\n kernel:  ? __pfx_hugetlbfs_fill_super+0x10/0x10\n kernel:  vfs_get_super+0x40/0xa0\n kernel:  ? __pfx_bpf_lsm_capable+0x10/0x10\n kernel:  vfs_get_tree+0x25/0xd0\n kernel:  vfs_cmd_create+0x64/0xe0\n kernel:  __x64_sys_fsconfig+0x395/0x410\n kernel:  do_syscall_64+0x80/0x160\n kernel:  ? syscall_exit_to_user_mode+0x82/0x240\n kernel:  ? do_syscall_64+0x8d/0x160\n kernel:  ? syscall_exit_to_user_mode+0x82/0x240\n kernel:  ? do_syscall_64+0x8d/0x160\n kernel:  ? exc_page_fault+0x69/0x150\n kernel:  entry_SYSCALL_64_after_hwframe+0x6e/0x76\n kernel: RIP: 0033:0x7ffbc0cb87c9\n kernel: Code: 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 \u003c48\u003e 3d 01 f0 ff ff 73 01 c3 48 8b 0d 97 96 0d 00 f7 d8 64 89 01 48\n kernel: RSP: 002b:00007ffc29d2f388 EFLAGS: 00000206 ORIG_RAX: 00000000000001af\n kernel: RAX: fffffffffff\n---truncated---",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26688",
          "url": "https://www.suse.com/security/cve/CVE-2024-26688"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222482 for CVE-2024-26688",
          "url": "https://bugzilla.suse.com/1222482"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T09:29:37Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26688"
    },
    {
      "cve": "CVE-2024-26689",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26689"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nceph: prevent use-after-free in encode_cap_msg()\n\nIn fs/ceph/caps.c, in encode_cap_msg(), \"use after free\" error was\ncaught by KASAN at this line - \u0027ceph_buffer_get(arg-\u003exattr_buf);\u0027. This\nimplies before the refcount could be increment here, it was freed.\n\nIn same file, in \"handle_cap_grant()\" refcount is decremented by this\nline - \u0027ceph_buffer_put(ci-\u003ei_xattrs.blob);\u0027. It appears that a race\noccurred and resource was freed by the latter line before the former\nline could increment it.\n\nencode_cap_msg() is called by __send_cap() and __send_cap() is called by\nceph_check_caps() after calling __prep_cap(). __prep_cap() is where\narg-\u003exattr_buf is assigned to ci-\u003ei_xattrs.blob. This is the spot where\nthe refcount must be increased to prevent \"use after free\" error.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26689",
          "url": "https://www.suse.com/security/cve/CVE-2024-26689"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222503 for CVE-2024-26689",
          "url": "https://bugzilla.suse.com/1222503"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T09:29:37Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26689"
    },
    {
      "cve": "CVE-2024-26696",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26696"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnilfs2: fix hang in nilfs_lookup_dirty_data_buffers()\n\nSyzbot reported a hang issue in migrate_pages_batch() called by mbind()\nand nilfs_lookup_dirty_data_buffers() called in the log writer of nilfs2.\n\nWhile migrate_pages_batch() locks a folio and waits for the writeback to\ncomplete, the log writer thread that should bring the writeback to\ncompletion picks up the folio being written back in\nnilfs_lookup_dirty_data_buffers() that it calls for subsequent log\ncreation and was trying to lock the folio.  Thus causing a deadlock.\n\nIn the first place, it is unexpected that folios/pages in the middle of\nwriteback will be updated and become dirty.  Nilfs2 adds a checksum to\nverify the validity of the log being written and uses it for recovery at\nmount, so data changes during writeback are suppressed.  Since this is\nbroken, an unclean shutdown could potentially cause recovery to fail.\n\nInvestigation revealed that the root cause is that the wait for writeback\ncompletion in nilfs_page_mkwrite() is conditional, and if the backing\ndevice does not require stable writes, data may be modified without\nwaiting.\n\nFix these issues by making nilfs_page_mkwrite() wait for writeback to\nfinish regardless of the stable write requirement of the backing device.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26696",
          "url": "https://www.suse.com/security/cve/CVE-2024-26696"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222549 for CVE-2024-26696",
          "url": "https://bugzilla.suse.com/1222549"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T09:29:37Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26696"
    },
    {
      "cve": "CVE-2024-26697",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26697"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnilfs2: fix data corruption in dsync block recovery for small block sizes\n\nThe helper function nilfs_recovery_copy_block() of\nnilfs_recovery_dsync_blocks(), which recovers data from logs created by\ndata sync writes during a mount after an unclean shutdown, incorrectly\ncalculates the on-page offset when copying repair data to the file\u0027s page\ncache.  In environments where the block size is smaller than the page\nsize, this flaw can cause data corruption and leak uninitialized memory\nbytes during the recovery process.\n\nFix these issues by correcting this byte offset calculation on the page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26697",
          "url": "https://www.suse.com/security/cve/CVE-2024-26697"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222550 for CVE-2024-26697",
          "url": "https://bugzilla.suse.com/1222550"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T09:29:37Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26697"
    },
    {
      "cve": "CVE-2024-26702",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26702"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\niio: magnetometer: rm3100: add boundary check for the value read from RM3100_REG_TMRC\n\nRecently, we encounter kernel crash in function rm3100_common_probe\ncaused by out of bound access of array rm3100_samp_rates (because of\nunderlying hardware failures). Add boundary check to prevent out of\nbound access.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26702",
          "url": "https://www.suse.com/security/cve/CVE-2024-26702"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222424 for CVE-2024-26702",
          "url": "https://bugzilla.suse.com/1222424"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T09:29:37Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26702"
    },
    {
      "cve": "CVE-2024-26704",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26704"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\next4: fix double-free of blocks due to wrong extents moved_len\n\nIn ext4_move_extents(), moved_len is only updated when all moves are\nsuccessfully executed, and only discards orig_inode and donor_inode\npreallocations when moved_len is not zero. When the loop fails to exit\nafter successfully moving some extents, moved_len is not updated and\nremains at 0, so it does not discard the preallocations.\n\nIf the moved extents overlap with the preallocated extents, the\noverlapped extents are freed twice in ext4_mb_release_inode_pa() and\next4_process_freed_data() (as described in commit 94d7c16cbbbd (\"ext4:\nFix double-free of blocks with EXT4_IOC_MOVE_EXT\")), and bb_free is\nincremented twice. Hence when trim is executed, a zero-division bug is\ntriggered in mb_update_avg_fragment_size() because bb_free is not zero\nand bb_fragments is zero.\n\nTherefore, update move_len after each extent move to avoid the issue.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26704",
          "url": "https://www.suse.com/security/cve/CVE-2024-26704"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222422 for CVE-2024-26704",
          "url": "https://bugzilla.suse.com/1222422"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T09:29:37Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26704"
    },
    {
      "cve": "CVE-2024-26718",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26718"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndm-crypt, dm-verity: disable tasklets\n\nTasklets have an inherent problem with memory corruption. The function\ntasklet_action_common calls tasklet_trylock, then it calls the tasklet\ncallback and then it calls tasklet_unlock. If the tasklet callback frees\nthe structure that contains the tasklet or if it calls some code that may\nfree it, tasklet_unlock will write into free memory.\n\nThe commits 8e14f610159d and d9a02e016aaf try to fix it for dm-crypt, but\nit is not a sufficient fix and the data corruption can still happen [1].\nThere is no fix for dm-verity and dm-verity will write into free memory\nwith every tasklet-processed bio.\n\nThere will be atomic workqueues implemented in the kernel 6.9 [2]. They\nwill have better interface and they will not suffer from the memory\ncorruption problem.\n\nBut we need something that stops the memory corruption now and that can be\nbackported to the stable kernels. So, I\u0027m proposing this commit that\ndisables tasklets in both dm-crypt and dm-verity. This commit doesn\u0027t\nremove the tasklet support, because the tasklet code will be reused when\natomic workqueues will be implemented.\n\n[1] https://lore.kernel.org/all/d390d7ee-f142-44d3-822a-87949e14608b@suse.de/T/\n[2] https://lore.kernel.org/lkml/20240130091300.2968534-1-tj@kernel.org/",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26718",
          "url": "https://www.suse.com/security/cve/CVE-2024-26718"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222416 for CVE-2024-26718",
          "url": "https://bugzilla.suse.com/1222416"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T09:29:37Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26718"
    },
    {
      "cve": "CVE-2024-26722",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26722"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nASoC: rt5645: Fix deadlock in rt5645_jack_detect_work()\n\nThere is a path in rt5645_jack_detect_work(), where rt5645-\u003ejd_mutex\nis left locked forever. That may lead to deadlock\nwhen rt5645_jack_detect_work() is called for the second time.\n\nFound by Linux Verification Center (linuxtesting.org) with SVACE.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26722",
          "url": "https://www.suse.com/security/cve/CVE-2024-26722"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222520 for CVE-2024-26722",
          "url": "https://bugzilla.suse.com/1222520"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T09:29:37Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26722"
    },
    {
      "cve": "CVE-2024-26727",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26727"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: do not ASSERT() if the newly created subvolume already got read\n\n[BUG]\nThere is a syzbot crash, triggered by the ASSERT() during subvolume\ncreation:\n\n assertion failed: !anon_dev, in fs/btrfs/disk-io.c:1319\n ------------[ cut here ]------------\n kernel BUG at fs/btrfs/disk-io.c:1319!\n invalid opcode: 0000 [#1] PREEMPT SMP KASAN\n RIP: 0010:btrfs_get_root_ref.part.0+0x9aa/0xa60\n  \u003cTASK\u003e\n  btrfs_get_new_fs_root+0xd3/0xf0\n  create_subvol+0xd02/0x1650\n  btrfs_mksubvol+0xe95/0x12b0\n  __btrfs_ioctl_snap_create+0x2f9/0x4f0\n  btrfs_ioctl_snap_create+0x16b/0x200\n  btrfs_ioctl+0x35f0/0x5cf0\n  __x64_sys_ioctl+0x19d/0x210\n  do_syscall_64+0x3f/0xe0\n  entry_SYSCALL_64_after_hwframe+0x63/0x6b\n ---[ end trace 0000000000000000 ]---\n\n[CAUSE]\nDuring create_subvol(), after inserting root item for the newly created\nsubvolume, we would trigger btrfs_get_new_fs_root() to get the\nbtrfs_root of that subvolume.\n\nThe idea here is, we have preallocated an anonymous device number for\nthe subvolume, thus we can assign it to the new subvolume.\n\nBut there is really nothing preventing things like backref walk to read\nthe new subvolume.\nIf that happens before we call btrfs_get_new_fs_root(), the subvolume\nwould be read out, with a new anonymous device number assigned already.\n\nIn that case, we would trigger ASSERT(), as we really expect no one to\nread out that subvolume (which is not yet accessible from the fs).\nBut things like backref walk is still possible to trigger the read on\nthe subvolume.\n\nThus our assumption on the ASSERT() is not correct in the first place.\n\n[FIX]\nFix it by removing the ASSERT(), and just free the @anon_dev, reset it\nto 0, and continue.\n\nIf the subvolume tree is read out by something else, it should have\nalready get a new anon_dev assigned thus we only need to free the\npreallocated one.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26727",
          "url": "https://www.suse.com/security/cve/CVE-2024-26727"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222536 for CVE-2024-26727",
          "url": "https://bugzilla.suse.com/1222536"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T09:29:37Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26727"
    },
    {
      "cve": "CVE-2024-26733",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26733"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\narp: Prevent overflow in arp_req_get().\n\nsyzkaller reported an overflown write in arp_req_get(). [0]\n\nWhen ioctl(SIOCGARP) is issued, arp_req_get() looks up an neighbour\nentry and copies neigh-\u003eha to struct arpreq.arp_ha.sa_data.\n\nThe arp_ha here is struct sockaddr, not struct sockaddr_storage, so\nthe sa_data buffer is just 14 bytes.\n\nIn the splat below, 2 bytes are overflown to the next int field,\narp_flags.  We initialise the field just after the memcpy(), so it\u0027s\nnot a problem.\n\nHowever, when dev-\u003eaddr_len is greater than 22 (e.g. MAX_ADDR_LEN),\narp_netmask is overwritten, which could be set as htonl(0xFFFFFFFFUL)\nin arp_ioctl() before calling arp_req_get().\n\nTo avoid the overflow, let\u0027s limit the max length of memcpy().\n\nNote that commit b5f0de6df6dc (\"net: dev: Convert sa_data to flexible\narray in struct sockaddr\") just silenced syzkaller.\n\n[0]:\nmemcpy: detected field-spanning write (size 16) of single field \"r-\u003earp_ha.sa_data\" at net/ipv4/arp.c:1128 (size 14)\nWARNING: CPU: 0 PID: 144638 at net/ipv4/arp.c:1128 arp_req_get+0x411/0x4a0 net/ipv4/arp.c:1128\nModules linked in:\nCPU: 0 PID: 144638 Comm: syz-executor.4 Not tainted 6.1.74 #31\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.0-debian-1.16.0-5 04/01/2014\nRIP: 0010:arp_req_get+0x411/0x4a0 net/ipv4/arp.c:1128\nCode: fd ff ff e8 41 42 de fb b9 0e 00 00 00 4c 89 fe 48 c7 c2 20 6d ab 87 48 c7 c7 80 6d ab 87 c6 05 25 af 72 04 01 e8 5f 8d ad fb \u003c0f\u003e 0b e9 6c fd ff ff e8 13 42 de fb be 03 00 00 00 4c 89 e7 e8 a6\nRSP: 0018:ffffc900050b7998 EFLAGS: 00010286\nRAX: 0000000000000000 RBX: ffff88803a815000 RCX: 0000000000000000\nRDX: 0000000000000000 RSI: ffffffff8641a44a RDI: 0000000000000001\nRBP: ffffc900050b7a98 R08: 0000000000000001 R09: 0000000000000000\nR10: 0000000000000000 R11: 203a7970636d656d R12: ffff888039c54000\nR13: 1ffff92000a16f37 R14: ffff88803a815084 R15: 0000000000000010\nFS:  00007f172bf306c0(0000) GS:ffff88805aa00000(0000) knlGS:0000000000000000\nCS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 00007f172b3569f0 CR3: 0000000057f12005 CR4: 0000000000770ef0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\nPKRU: 55555554\nCall Trace:\n \u003cTASK\u003e\n arp_ioctl+0x33f/0x4b0 net/ipv4/arp.c:1261\n inet_ioctl+0x314/0x3a0 net/ipv4/af_inet.c:981\n sock_do_ioctl+0xdf/0x260 net/socket.c:1204\n sock_ioctl+0x3ef/0x650 net/socket.c:1321\n vfs_ioctl fs/ioctl.c:51 [inline]\n __do_sys_ioctl fs/ioctl.c:870 [inline]\n __se_sys_ioctl fs/ioctl.c:856 [inline]\n __x64_sys_ioctl+0x18e/0x220 fs/ioctl.c:856\n do_syscall_x64 arch/x86/entry/common.c:51 [inline]\n do_syscall_64+0x37/0x90 arch/x86/entry/common.c:81\n entry_SYSCALL_64_after_hwframe+0x64/0xce\nRIP: 0033:0x7f172b262b8d\nCode: 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 \u003c48\u003e 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48\nRSP: 002b:00007f172bf300b8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010\nRAX: ffffffffffffffda RBX: 00007f172b3abf80 RCX: 00007f172b262b8d\nRDX: 0000000020000000 RSI: 0000000000008954 RDI: 0000000000000003\nRBP: 00007f172b2d3493 R08: 0000000000000000 R09: 0000000000000000\nR10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000\nR13: 000000000000000b R14: 00007f172b3abf80 R15: 00007f172bf10000\n \u003c/TASK\u003e",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26733",
          "url": "https://www.suse.com/security/cve/CVE-2024-26733"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222585 for CVE-2024-26733",
          "url": "https://bugzilla.suse.com/1222585"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T09:29:37Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26733"
    },
    {
      "cve": "CVE-2024-26736",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26736"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nafs: Increase buffer size in afs_update_volume_status()\n\nThe max length of volume-\u003evid value is 20 characters.\nSo increase idbuf[] size up to 24 to avoid overflow.\n\nFound by Linux Verification Center (linuxtesting.org) with SVACE.\n\n[DH: Actually, it\u0027s 20 + NUL, so increase it to 24 and use snprintf()]",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26736",
          "url": "https://www.suse.com/security/cve/CVE-2024-26736"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222586 for CVE-2024-26736",
          "url": "https://bugzilla.suse.com/1222586"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T09:29:37Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26736"
    },
    {
      "cve": "CVE-2024-26737",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26737"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Fix racing between bpf_timer_cancel_and_free and bpf_timer_cancel\n\nThe following race is possible between bpf_timer_cancel_and_free\nand bpf_timer_cancel. It will lead a UAF on the timer-\u003etimer.\n\nbpf_timer_cancel();\n\tspin_lock();\n\tt = timer-\u003etime;\n\tspin_unlock();\n\n\t\t\t\t\tbpf_timer_cancel_and_free();\n\t\t\t\t\t\tspin_lock();\n\t\t\t\t\t\tt = timer-\u003etimer;\n\t\t\t\t\t\ttimer-\u003etimer = NULL;\n\t\t\t\t\t\tspin_unlock();\n\t\t\t\t\t\thrtimer_cancel(\u0026t-\u003etimer);\n\t\t\t\t\t\tkfree(t);\n\n\t/* UAF on t */\n\thrtimer_cancel(\u0026t-\u003etimer);\n\nIn bpf_timer_cancel_and_free, this patch frees the timer-\u003etimer\nafter a rcu grace period. This requires a rcu_head addition\nto the \"struct bpf_hrtimer\". Another kfree(t) happens in bpf_timer_init,\nthis does not need a kfree_rcu because it is still under the\nspin_lock and timer-\u003etimer has not been visible by others yet.\n\nIn bpf_timer_cancel, rcu_read_lock() is added because this helper\ncan be used in a non rcu critical section context (e.g. from\na sleepable bpf prog). Other timer-\u003etimer usages in helpers.c\nhave been audited, bpf_timer_cancel() is the only place where\ntimer-\u003etimer is used outside of the spin_lock.\n\nAnother solution considered is to mark a t-\u003eflag in bpf_timer_cancel\nand clear it after hrtimer_cancel() is done.  In bpf_timer_cancel_and_free,\nit busy waits for the flag to be cleared before kfree(t). This patch\ngoes with a straight forward solution and frees timer-\u003etimer after\na rcu grace period.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26737",
          "url": "https://www.suse.com/security/cve/CVE-2024-26737"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222557 for CVE-2024-26737",
          "url": "https://bugzilla.suse.com/1222557"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T09:29:37Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26737"
    },
    {
      "cve": "CVE-2024-26739",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26739"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/sched: act_mirred: don\u0027t override retval if we already lost the skb\n\nIf we\u0027re redirecting the skb, and haven\u0027t called tcf_mirred_forward(),\nyet, we need to tell the core to drop the skb by setting the retcode\nto SHOT. If we have called tcf_mirred_forward(), however, the skb\nis out of our hands and returning SHOT will lead to UaF.\n\nMove the retval override to the error path which actually need it.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26739",
          "url": "https://www.suse.com/security/cve/CVE-2024-26739"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222559 for CVE-2024-26739",
          "url": "https://bugzilla.suse.com/1222559"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T09:29:37Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26739"
    },
    {
      "cve": "CVE-2024-26743",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26743"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/qedr: Fix qedr_create_user_qp error flow\n\nAvoid the following warning by making sure to free the allocated\nresources in case that qedr_init_user_queue() fail.\n\n-----------[ cut here ]-----------\nWARNING: CPU: 0 PID: 143192 at drivers/infiniband/core/rdma_core.c:874 uverbs_destroy_ufile_hw+0xcf/0xf0 [ib_uverbs]\nModules linked in: tls target_core_user uio target_core_pscsi target_core_file target_core_iblock ib_srpt ib_srp scsi_transport_srp nfsd nfs_acl rpcsec_gss_krb5 auth_rpcgss nfsv4 dns_resolver nfs lockd grace fscache netfs 8021q garp mrp stp llc ext4 mbcache jbd2 opa_vnic ib_umad ib_ipoib sunrpc rdma_ucm ib_isert iscsi_target_mod target_core_mod ib_iser libiscsi scsi_transport_iscsi rdma_cm iw_cm ib_cm hfi1 intel_rapl_msr intel_rapl_common mgag200 qedr sb_edac drm_shmem_helper rdmavt x86_pkg_temp_thermal drm_kms_helper intel_powerclamp ib_uverbs coretemp i2c_algo_bit kvm_intel dell_wmi_descriptor ipmi_ssif sparse_keymap kvm ib_core rfkill syscopyarea sysfillrect video sysimgblt irqbypass ipmi_si ipmi_devintf fb_sys_fops rapl iTCO_wdt mxm_wmi iTCO_vendor_support intel_cstate pcspkr dcdbas intel_uncore ipmi_msghandler lpc_ich acpi_power_meter mei_me mei fuse drm xfs libcrc32c qede sd_mod ahci libahci t10_pi sg crct10dif_pclmul crc32_pclmul crc32c_intel qed libata tg3\nghash_clmulni_intel megaraid_sas crc8 wmi [last unloaded: ib_srpt]\nCPU: 0 PID: 143192 Comm: fi_rdm_tagged_p Kdump: loaded Not tainted 5.14.0-408.el9.x86_64 #1\nHardware name: Dell Inc. PowerEdge R430/03XKDV, BIOS 2.14.0 01/25/2022\nRIP: 0010:uverbs_destroy_ufile_hw+0xcf/0xf0 [ib_uverbs]\nCode: 5d 41 5c 41 5d 41 5e e9 0f 26 1b dd 48 89 df e8 67 6a ff ff 49 8b 86 10 01 00 00 48 85 c0 74 9c 4c 89 e7 e8 83 c0 cb dd eb 92 \u003c0f\u003e 0b eb be 0f 0b be 04 00 00 00 48 89 df e8 8e f5 ff ff e9 6d ff\nRSP: 0018:ffffb7c6cadfbc60 EFLAGS: 00010286\nRAX: ffff8f0889ee3f60 RBX: ffff8f088c1a5200 RCX: 00000000802a0016\nRDX: 00000000802a0017 RSI: 0000000000000001 RDI: ffff8f0880042600\nRBP: 0000000000000001 R08: 0000000000000001 R09: 0000000000000000\nR10: ffff8f11fffd5000 R11: 0000000000039000 R12: ffff8f0d5b36cd80\nR13: ffff8f088c1a5250 R14: ffff8f1206d91000 R15: 0000000000000000\nFS: 0000000000000000(0000) GS:ffff8f11d7c00000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 0000147069200e20 CR3: 00000001c7210002 CR4: 00000000001706f0\nCall Trace:\n\u003cTASK\u003e\n? show_trace_log_lvl+0x1c4/0x2df\n? show_trace_log_lvl+0x1c4/0x2df\n? ib_uverbs_close+0x1f/0xb0 [ib_uverbs]\n? uverbs_destroy_ufile_hw+0xcf/0xf0 [ib_uverbs]\n? __warn+0x81/0x110\n? uverbs_destroy_ufile_hw+0xcf/0xf0 [ib_uverbs]\n? report_bug+0x10a/0x140\n? handle_bug+0x3c/0x70\n? exc_invalid_op+0x14/0x70\n? asm_exc_invalid_op+0x16/0x20\n? uverbs_destroy_ufile_hw+0xcf/0xf0 [ib_uverbs]\nib_uverbs_close+0x1f/0xb0 [ib_uverbs]\n__fput+0x94/0x250\ntask_work_run+0x5c/0x90\ndo_exit+0x270/0x4a0\ndo_group_exit+0x2d/0x90\nget_signal+0x87c/0x8c0\narch_do_signal_or_restart+0x25/0x100\n? ib_uverbs_ioctl+0xc2/0x110 [ib_uverbs]\nexit_to_user_mode_loop+0x9c/0x130\nexit_to_user_mode_prepare+0xb6/0x100\nsyscall_exit_to_user_mode+0x12/0x40\ndo_syscall_64+0x69/0x90\n? syscall_exit_work+0x103/0x130\n? syscall_exit_to_user_mode+0x22/0x40\n? do_syscall_64+0x69/0x90\n? syscall_exit_work+0x103/0x130\n? syscall_exit_to_user_mode+0x22/0x40\n? do_syscall_64+0x69/0x90\n? do_syscall_64+0x69/0x90\n? common_interrupt+0x43/0xa0\nentry_SYSCALL_64_after_hwframe+0x72/0xdc\nRIP: 0033:0x1470abe3ec6b\nCode: Unable to access opcode bytes at RIP 0x1470abe3ec41.\nRSP: 002b:00007fff13ce9108 EFLAGS: 00000246 ORIG_RAX: 0000000000000010\nRAX: fffffffffffffffc RBX: 00007fff13ce9218 RCX: 00001470abe3ec6b\nRDX: 00007fff13ce9200 RSI: 00000000c0181b01 RDI: 0000000000000004\nRBP: 00007fff13ce91e0 R08: 0000558d9655da10 R09: 0000558d9655dd00\nR10: 00007fff13ce95c0 R11: 0000000000000246 R12: 00007fff13ce9358\nR13: 0000000000000013 R14: 0000558d9655db50 R15: 00007fff13ce9470\n\u003c/TASK\u003e\n--[ end trace 888a9b92e04c5c97 ]--",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26743",
          "url": "https://www.suse.com/security/cve/CVE-2024-26743"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222677 for CVE-2024-26743",
          "url": "https://bugzilla.suse.com/1222677"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T09:29:37Z",
          "details": "low"
        }
      ],
      "title": "CVE-2024-26743"
    },
    {
      "cve": "CVE-2024-26744",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26744"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/srpt: Support specifying the srpt_service_guid parameter\n\nMake loading ib_srpt with this parameter set work. The current behavior is\nthat setting that parameter while loading the ib_srpt kernel module\ntriggers the following kernel crash:\n\nBUG: kernel NULL pointer dereference, address: 0000000000000000\nCall Trace:\n \u003cTASK\u003e\n parse_one+0x18c/0x1d0\n parse_args+0xe1/0x230\n load_module+0x8de/0xa60\n init_module_from_file+0x8b/0xd0\n idempotent_init_module+0x181/0x240\n __x64_sys_finit_module+0x5a/0xb0\n do_syscall_64+0x5f/0xe0\n entry_SYSCALL_64_after_hwframe+0x6e/0x76",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26744",
          "url": "https://www.suse.com/security/cve/CVE-2024-26744"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222449 for CVE-2024-26744",
          "url": "https://bugzilla.suse.com/1222449"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T09:29:37Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26744"
    },
    {
      "cve": "CVE-2024-26745",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26745"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\npowerpc/pseries/iommu: IOMMU table is not initialized for kdump over SR-IOV\n\nWhen kdump kernel tries to copy dump data over SR-IOV, LPAR panics due\nto NULL pointer exception:\n\n  Kernel attempted to read user page (0) - exploit attempt? (uid: 0)\n  BUG: Kernel NULL pointer dereference on read at 0x00000000\n  Faulting instruction address: 0xc000000020847ad4\n  Oops: Kernel access of bad area, sig: 11 [#1]\n  LE PAGE_SIZE=64K MMU=Radix SMP NR_CPUS=2048 NUMA pSeries\n  Modules linked in: mlx5_core(+) vmx_crypto pseries_wdt papr_scm libnvdimm mlxfw tls psample sunrpc fuse overlay squashfs loop\n  CPU: 12 PID: 315 Comm: systemd-udevd Not tainted 6.4.0-Test102+ #12\n  Hardware name: IBM,9080-HEX POWER10 (raw) 0x800200 0xf000006 of:IBM,FW1060.00 (NH1060_008) hv:phyp pSeries\n  NIP:  c000000020847ad4 LR: c00000002083b2dc CTR: 00000000006cd18c\n  REGS: c000000029162ca0 TRAP: 0300   Not tainted  (6.4.0-Test102+)\n  MSR:  800000000280b033 \u003cSF,VEC,VSX,EE,FP,ME,IR,DR,RI,LE\u003e  CR: 48288244  XER: 00000008\n  CFAR: c00000002083b2d8 DAR: 0000000000000000 DSISR: 40000000 IRQMASK: 1\n  ...\n  NIP _find_next_zero_bit+0x24/0x110\n  LR  bitmap_find_next_zero_area_off+0x5c/0xe0\n  Call Trace:\n    dev_printk_emit+0x38/0x48 (unreliable)\n    iommu_area_alloc+0xc4/0x180\n    iommu_range_alloc+0x1e8/0x580\n    iommu_alloc+0x60/0x130\n    iommu_alloc_coherent+0x158/0x2b0\n    dma_iommu_alloc_coherent+0x3c/0x50\n    dma_alloc_attrs+0x170/0x1f0\n    mlx5_cmd_init+0xc0/0x760 [mlx5_core]\n    mlx5_function_setup+0xf0/0x510 [mlx5_core]\n    mlx5_init_one+0x84/0x210 [mlx5_core]\n    probe_one+0x118/0x2c0 [mlx5_core]\n    local_pci_probe+0x68/0x110\n    pci_call_probe+0x68/0x200\n    pci_device_probe+0xbc/0x1a0\n    really_probe+0x104/0x540\n    __driver_probe_device+0xb4/0x230\n    driver_probe_device+0x54/0x130\n    __driver_attach+0x158/0x2b0\n    bus_for_each_dev+0xa8/0x130\n    driver_attach+0x34/0x50\n    bus_add_driver+0x16c/0x300\n    driver_register+0xa4/0x1b0\n    __pci_register_driver+0x68/0x80\n    mlx5_init+0xb8/0x100 [mlx5_core]\n    do_one_initcall+0x60/0x300\n    do_init_module+0x7c/0x2b0\n\nAt the time of LPAR dump, before kexec hands over control to kdump\nkernel, DDWs (Dynamic DMA Windows) are scanned and added to the FDT.\nFor the SR-IOV case, default DMA window \"ibm,dma-window\" is removed from\nthe FDT and DDW added, for the device.\n\nNow, kexec hands over control to the kdump kernel.\n\nWhen the kdump kernel initializes, PCI busses are scanned and IOMMU\ngroup/tables created, in pci_dma_bus_setup_pSeriesLP(). For the SR-IOV\ncase, there is no \"ibm,dma-window\". The original commit: b1fc44eaa9ba,\nfixes the path where memory is pre-mapped (direct mapped) to the DDW.\nWhen TCEs are direct mapped, there is no need to initialize IOMMU\ntables.\n\niommu_table_setparms_lpar() only considers \"ibm,dma-window\" property\nwhen initiallizing IOMMU table. In the scenario where TCEs are\ndynamically allocated for SR-IOV, newly created IOMMU table is not\ninitialized. Later, when the device driver tries to enter TCEs for the\nSR-IOV device, NULL pointer execption is thrown from iommu_area_alloc().\n\nThe fix is to initialize the IOMMU table with DDW property stored in the\nFDT. There are 2 points to remember:\n\n\t1. For the dedicated adapter, kdump kernel would encounter both\n\t   default and DDW in FDT. In this case, DDW property is used to\n\t   initialize the IOMMU table.\n\n\t2. A DDW could be direct or dynamic mapped. kdump kernel would\n\t   initialize IOMMU table and mark the existing DDW as\n\t   \"dynamic\". This works fine since, at the time of table\n\t   initialization, iommu_table_clear() makes some space in the\n\t   DDW, for some predefined number of TCEs which are needed for\n\t   kdump to succeed.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26745",
          "url": "https://www.suse.com/security/cve/CVE-2024-26745"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222678 for CVE-2024-26745",
          "url": "https://bugzilla.suse.com/1222678"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T09:29:37Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26745"
    },
    {
      "cve": "CVE-2024-26747",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26747"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: roles: fix NULL pointer issue when put module\u0027s reference\n\nIn current design, usb role class driver will get usb_role_switch parent\u0027s\nmodule reference after the user get usb_role_switch device and put the\nreference after the user put the usb_role_switch device. However, the\nparent device of usb_role_switch may be removed before the user put the\nusb_role_switch. If so, then, NULL pointer issue will be met when the user\nput the parent module\u0027s reference.\n\nThis will save the module pointer in structure of usb_role_switch. Then,\nwe don\u0027t need to find module by iterating long relations.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26747",
          "url": "https://www.suse.com/security/cve/CVE-2024-26747"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222609 for CVE-2024-26747",
          "url": "https://bugzilla.suse.com/1222609"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T09:29:37Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26747"
    },
    {
      "cve": "CVE-2024-26749",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26749"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: cdns3: fixed memory use after free at cdns3_gadget_ep_disable()\n\n  ...\n  cdns3_gadget_ep_free_request(\u0026priv_ep-\u003eendpoint, \u0026priv_req-\u003erequest);\n  list_del_init(\u0026priv_req-\u003elist);\n  ...\n\n\u0027priv_req\u0027 actually free at cdns3_gadget_ep_free_request(). But\nlist_del_init() use priv_req-\u003elist after it.\n\n[ 1542.642868][  T534] BUG: KFENCE: use-after-free read in __list_del_entry_valid+0x10/0xd4\n[ 1542.642868][  T534]\n[ 1542.653162][  T534] Use-after-free read at 0x000000009ed0ba99 (in kfence-#3):\n[ 1542.660311][  T534]  __list_del_entry_valid+0x10/0xd4\n[ 1542.665375][  T534]  cdns3_gadget_ep_disable+0x1f8/0x388 [cdns3]\n[ 1542.671571][  T534]  usb_ep_disable+0x44/0xe4\n[ 1542.675948][  T534]  ffs_func_eps_disable+0x64/0xc8\n[ 1542.680839][  T534]  ffs_func_set_alt+0x74/0x368\n[ 1542.685478][  T534]  ffs_func_disable+0x18/0x28\n\nMove list_del_init() before cdns3_gadget_ep_free_request() to resolve this\nproblem.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26749",
          "url": "https://www.suse.com/security/cve/CVE-2024-26749"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222680 for CVE-2024-26749",
          "url": "https://bugzilla.suse.com/1222680"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T09:29:37Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26749"
    },
    {
      "cve": "CVE-2024-26751",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26751"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nARM: ep93xx: Add terminator to gpiod_lookup_table\n\nWithout the terminator, if a con_id is passed to gpio_find() that\ndoes not exist in the lookup table the function will not stop looping\ncorrectly, and eventually cause an oops.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26751",
          "url": "https://www.suse.com/security/cve/CVE-2024-26751"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222724 for CVE-2024-26751",
          "url": "https://bugzilla.suse.com/1222724"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T09:29:37Z",
          "details": "low"
        }
      ],
      "title": "CVE-2024-26751"
    },
    {
      "cve": "CVE-2024-26754",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26754"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ngtp: fix use-after-free and null-ptr-deref in gtp_genl_dump_pdp()\n\nThe gtp_net_ops pernet operations structure for the subsystem must be\nregistered before registering the generic netlink family.\n\nSyzkaller hit \u0027general protection fault in gtp_genl_dump_pdp\u0027 bug:\n\ngeneral protection fault, probably for non-canonical address\n0xdffffc0000000002: 0000 [#1] PREEMPT SMP KASAN NOPTI\nKASAN: null-ptr-deref in range [0x0000000000000010-0x0000000000000017]\nCPU: 1 PID: 5826 Comm: gtp Not tainted 6.8.0-rc3-std-def-alt1 #1\nHardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.0-alt1 04/01/2014\nRIP: 0010:gtp_genl_dump_pdp+0x1be/0x800 [gtp]\nCode: c6 89 c6 e8 64 e9 86 df 58 45 85 f6 0f 85 4e 04 00 00 e8 c5 ee 86\n      df 48 8b 54 24 18 48 b8 00 00 00 00 00 fc ff df 48 c1 ea 03 \u003c80\u003e\n      3c 02 00 0f 85 de 05 00 00 48 8b 44 24 18 4c 8b 30 4c 39 f0 74\nRSP: 0018:ffff888014107220 EFLAGS: 00010202\nRAX: dffffc0000000000 RBX: 0000000000000000 RCX: 0000000000000000\nRDX: 0000000000000002 RSI: 0000000000000000 RDI: 0000000000000000\nRBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000\nR10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000\nR13: ffff88800fcda588 R14: 0000000000000001 R15: 0000000000000000\nFS:  00007f1be4eb05c0(0000) GS:ffff88806ce80000(0000) knlGS:0000000000000000\nCS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 00007f1be4e766cf CR3: 000000000c33e000 CR4: 0000000000750ef0\nPKRU: 55555554\nCall Trace:\n \u003cTASK\u003e\n ? show_regs+0x90/0xa0\n ? die_addr+0x50/0xd0\n ? exc_general_protection+0x148/0x220\n ? asm_exc_general_protection+0x22/0x30\n ? gtp_genl_dump_pdp+0x1be/0x800 [gtp]\n ? __alloc_skb+0x1dd/0x350\n ? __pfx___alloc_skb+0x10/0x10\n genl_dumpit+0x11d/0x230\n netlink_dump+0x5b9/0xce0\n ? lockdep_hardirqs_on_prepare+0x253/0x430\n ? __pfx_netlink_dump+0x10/0x10\n ? kasan_save_track+0x10/0x40\n ? __kasan_kmalloc+0x9b/0xa0\n ? genl_start+0x675/0x970\n __netlink_dump_start+0x6fc/0x9f0\n genl_family_rcv_msg_dumpit+0x1bb/0x2d0\n ? __pfx_genl_family_rcv_msg_dumpit+0x10/0x10\n ? genl_op_from_small+0x2a/0x440\n ? cap_capable+0x1d0/0x240\n ? __pfx_genl_start+0x10/0x10\n ? __pfx_genl_dumpit+0x10/0x10\n ? __pfx_genl_done+0x10/0x10\n ? security_capable+0x9d/0xe0",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26754",
          "url": "https://www.suse.com/security/cve/CVE-2024-26754"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222632 for CVE-2024-26754",
          "url": "https://bugzilla.suse.com/1222632"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T09:29:37Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26754"
    },
    {
      "cve": "CVE-2024-26760",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26760"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: target: pscsi: Fix bio_put() for error case\n\nAs of commit 066ff571011d (\"block: turn bio_kmalloc into a simple kmalloc\nwrapper\"), a bio allocated by bio_kmalloc() must be freed by bio_uninit()\nand kfree(). That is not done properly for the error case, hitting WARN and\nNULL pointer dereference in bio_free().",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26760",
          "url": "https://www.suse.com/security/cve/CVE-2024-26760"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222596 for CVE-2024-26760",
          "url": "https://bugzilla.suse.com/1222596"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T09:29:37Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26760"
    },
    {
      "cve": "CVE-2024-26763",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26763"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndm-crypt: don\u0027t modify the data when using authenticated encryption\n\nIt was said that authenticated encryption could produce invalid tag when\nthe data that is being encrypted is modified [1]. So, fix this problem by\ncopying the data into the clone bio first and then encrypt them inside the\nclone bio.\n\nThis may reduce performance, but it is needed to prevent the user from\ncorrupting the device by writing data with O_DIRECT and modifying them at\nthe same time.\n\n[1] https://lore.kernel.org/all/20240207004723.GA35324@sol.localdomain/T/",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26763",
          "url": "https://www.suse.com/security/cve/CVE-2024-26763"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222720 for CVE-2024-26763",
          "url": "https://bugzilla.suse.com/1222720"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T09:29:37Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26763"
    },
    {
      "cve": "CVE-2024-26764",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26764"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfs/aio: Restrict kiocb_set_cancel_fn() to I/O submitted via libaio\n\nIf kiocb_set_cancel_fn() is called for I/O submitted via io_uring, the\nfollowing kernel warning appears:\n\nWARNING: CPU: 3 PID: 368 at fs/aio.c:598 kiocb_set_cancel_fn+0x9c/0xa8\nCall trace:\n kiocb_set_cancel_fn+0x9c/0xa8\n ffs_epfile_read_iter+0x144/0x1d0\n io_read+0x19c/0x498\n io_issue_sqe+0x118/0x27c\n io_submit_sqes+0x25c/0x5fc\n __arm64_sys_io_uring_enter+0x104/0xab0\n invoke_syscall+0x58/0x11c\n el0_svc_common+0xb4/0xf4\n do_el0_svc+0x2c/0xb0\n el0_svc+0x2c/0xa4\n el0t_64_sync_handler+0x68/0xb4\n el0t_64_sync+0x1a4/0x1a8\n\nFix this by setting the IOCB_AIO_RW flag for read and write I/O that is\nsubmitted by libaio.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26764",
          "url": "https://www.suse.com/security/cve/CVE-2024-26764"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222721 for CVE-2024-26764",
          "url": "https://bugzilla.suse.com/1222721"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T09:29:37Z",
          "details": "low"
        }
      ],
      "title": "CVE-2024-26764"
    },
    {
      "cve": "CVE-2024-26766",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26766"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nIB/hfi1: Fix sdma.h tx-\u003enum_descs off-by-one error\n\nUnfortunately the commit `fd8958efe877` introduced another error\ncausing the `descs` array to overflow. This reults in further crashes\neasily reproducible by `sendmsg` system call.\n\n[ 1080.836473] general protection fault, probably for non-canonical address 0x400300015528b00a: 0000 [#1] PREEMPT SMP PTI\n[ 1080.869326] RIP: 0010:hfi1_ipoib_build_ib_tx_headers.constprop.0+0xe1/0x2b0 [hfi1]\n--\n[ 1080.974535] Call Trace:\n[ 1080.976990]  \u003cTASK\u003e\n[ 1081.021929]  hfi1_ipoib_send_dma_common+0x7a/0x2e0 [hfi1]\n[ 1081.027364]  hfi1_ipoib_send_dma_list+0x62/0x270 [hfi1]\n[ 1081.032633]  hfi1_ipoib_send+0x112/0x300 [hfi1]\n[ 1081.042001]  ipoib_start_xmit+0x2a9/0x2d0 [ib_ipoib]\n[ 1081.046978]  dev_hard_start_xmit+0xc4/0x210\n--\n[ 1081.148347]  __sys_sendmsg+0x59/0xa0\n\ncrash\u003e ipoib_txreq 0xffff9cfeba229f00\nstruct ipoib_txreq {\n  txreq = {\n    list = {\n      next = 0xffff9cfeba229f00,\n      prev = 0xffff9cfeba229f00\n    },\n    descp = 0xffff9cfeba229f40,\n    coalesce_buf = 0x0,\n    wait = 0xffff9cfea4e69a48,\n    complete = 0xffffffffc0fe0760 \u003chfi1_ipoib_sdma_complete\u003e,\n    packet_len = 0x46d,\n    tlen = 0x0,\n    num_desc = 0x0,\n    desc_limit = 0x6,\n    next_descq_idx = 0x45c,\n    coalesce_idx = 0x0,\n    flags = 0x0,\n    descs = {{\n        qw = {0x8024000120dffb00, 0x4}  # SDMA_DESC0_FIRST_DESC_FLAG (bit 63)\n      }, {\n        qw = {  0x3800014231b108, 0x4}\n      }, {\n        qw = { 0x310000e4ee0fcf0, 0x8}\n      }, {\n        qw = {  0x3000012e9f8000, 0x8}\n      }, {\n        qw = {  0x59000dfb9d0000, 0x8}\n      }, {\n        qw = {  0x78000e02e40000, 0x8}\n      }}\n  },\n  sdma_hdr =  0x400300015528b000,  \u003c\u003c\u003c invalid pointer in the tx request structure\n  sdma_status = 0x0,                   SDMA_DESC0_LAST_DESC_FLAG (bit 62)\n  complete = 0x0,\n  priv = 0x0,\n  txq = 0xffff9cfea4e69880,\n  skb = 0xffff9d099809f400\n}\n\nIf an SDMA send consists of exactly 6 descriptors and requires dword\npadding (in the 7th descriptor), the sdma_txreq descriptor array is not\nproperly expanded and the packet will overflow into the container\nstructure. This results in a panic when the send completion runs. The\nexact panic varies depending on what elements of the container structure\nget corrupted. The fix is to use the correct expression in\n_pad_sdma_tx_descs() to test the need to expand the descriptor array.\n\nWith this patch the crashes are no longer reproducible and the machine is\nstable.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26766",
          "url": "https://www.suse.com/security/cve/CVE-2024-26766"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222726 for CVE-2024-26766",
          "url": "https://bugzilla.suse.com/1222726"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222882 for CVE-2024-26766",
          "url": "https://bugzilla.suse.com/1222882"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T09:29:37Z",
          "details": "important"
        }
      ],
      "title": "CVE-2024-26766"
    },
    {
      "cve": "CVE-2024-26769",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26769"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnvmet-fc: avoid deadlock on delete association path\n\nWhen deleting an association the shutdown path is deadlocking because we\ntry to flush the nvmet_wq nested. Avoid this by deadlock by deferring\nthe put work into its own work item.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26769",
          "url": "https://www.suse.com/security/cve/CVE-2024-26769"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222727 for CVE-2024-26769",
          "url": "https://bugzilla.suse.com/1222727"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T09:29:37Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26769"
    },
    {
      "cve": "CVE-2024-26771",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26771"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndmaengine: ti: edma: Add some null pointer checks to the edma_probe\n\ndevm_kasprintf() returns a pointer to dynamically allocated memory\nwhich can be NULL upon failure. Ensure the allocation was successful\nby checking the pointer validity.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26771",
          "url": "https://www.suse.com/security/cve/CVE-2024-26771"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222610 for CVE-2024-26771",
          "url": "https://bugzilla.suse.com/1222610"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T09:29:37Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26771"
    },
    {
      "cve": "CVE-2024-26772",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26772"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\next4: avoid allocating blocks from corrupted group in ext4_mb_find_by_goal()\n\nPlaces the logic for checking if the group\u0027s block bitmap is corrupt under\nthe protection of the group lock to avoid allocating blocks from the group\nwith a corrupted block bitmap.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26772",
          "url": "https://www.suse.com/security/cve/CVE-2024-26772"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222613 for CVE-2024-26772",
          "url": "https://bugzilla.suse.com/1222613"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T09:29:37Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26772"
    },
    {
      "cve": "CVE-2024-26773",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26773"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\next4: avoid allocating blocks from corrupted group in ext4_mb_try_best_found()\n\nDetermine if the group block bitmap is corrupted before using ac_b_ex in\next4_mb_try_best_found() to avoid allocating blocks from a group with a\ncorrupted block bitmap in the following concurrency and making the\nsituation worse.\n\next4_mb_regular_allocator\n  ext4_lock_group(sb, group)\n  ext4_mb_good_group\n   // check if the group bbitmap is corrupted\n  ext4_mb_complex_scan_group\n   // Scan group gets ac_b_ex but doesn\u0027t use it\n  ext4_unlock_group(sb, group)\n                           ext4_mark_group_bitmap_corrupted(group)\n                           // The block bitmap was corrupted during\n                           // the group unlock gap.\n  ext4_mb_try_best_found\n    ext4_lock_group(ac-\u003eac_sb, group)\n    ext4_mb_use_best_found\n      mb_mark_used\n      // Allocating blocks in block bitmap corrupted group",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26773",
          "url": "https://www.suse.com/security/cve/CVE-2024-26773"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222618 for CVE-2024-26773",
          "url": "https://bugzilla.suse.com/1222618"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T09:29:37Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26773"
    },
    {
      "cve": "CVE-2024-26776",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26776"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nspi: hisi-sfc-v3xx: Return IRQ_NONE if no interrupts were detected\n\nReturn IRQ_NONE from the interrupt handler when no interrupt was\ndetected. Because an empty interrupt will cause a null pointer error:\n\n    Unable to handle kernel NULL pointer dereference at virtual\n  address 0000000000000008\n    Call trace:\n        complete+0x54/0x100\n        hisi_sfc_v3xx_isr+0x2c/0x40 [spi_hisi_sfc_v3xx]\n        __handle_irq_event_percpu+0x64/0x1e0\n        handle_irq_event+0x7c/0x1cc",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26776",
          "url": "https://www.suse.com/security/cve/CVE-2024-26776"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222764 for CVE-2024-26776",
          "url": "https://bugzilla.suse.com/1222764"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T09:29:37Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26776"
    },
    {
      "cve": "CVE-2024-26779",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26779"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: mac80211: fix race condition on enabling fast-xmit\n\nfast-xmit must only be enabled after the sta has been uploaded to the driver,\notherwise it could end up passing the not-yet-uploaded sta via drv_tx calls\nto the driver, leading to potential crashes because of uninitialized drv_priv\ndata.\nAdd a missing sta-\u003euploaded check and re-check fast xmit after inserting a sta.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26779",
          "url": "https://www.suse.com/security/cve/CVE-2024-26779"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222772 for CVE-2024-26779",
          "url": "https://bugzilla.suse.com/1222772"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T09:29:37Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26779"
    },
    {
      "cve": "CVE-2024-26783",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26783"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm/vmscan: fix a bug calling wakeup_kswapd() with a wrong zone index\n\nWith numa balancing on, when a numa system is running where a numa node\ndoesn\u0027t have its local memory so it has no managed zones, the following\noops has been observed.  It\u0027s because wakeup_kswapd() is called with a\nwrong zone index, -1.  Fixed it by checking the index before calling\nwakeup_kswapd().\n\n\u003e BUG: unable to handle page fault for address: 00000000000033f3\n\u003e #PF: supervisor read access in kernel mode\n\u003e #PF: error_code(0x0000) - not-present page\n\u003e PGD 0 P4D 0\n\u003e Oops: 0000 [#1] PREEMPT SMP NOPTI\n\u003e CPU: 2 PID: 895 Comm: masim Not tainted 6.6.0-dirty #255\n\u003e Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS\n\u003e    rel-1.16.0-0-gd239552ce722-prebuilt.qemu.org 04/01/2014\n\u003e RIP: 0010:wakeup_kswapd (./linux/mm/vmscan.c:7812)\n\u003e Code: (omitted)\n\u003e RSP: 0000:ffffc90004257d58 EFLAGS: 00010286\n\u003e RAX: ffffffffffffffff RBX: ffff88883fff0480 RCX: 0000000000000003\n\u003e RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffff88883fff0480\n\u003e RBP: ffffffffffffffff R08: ff0003ffffffffff R09: ffffffffffffffff\n\u003e R10: ffff888106c95540 R11: 0000000055555554 R12: 0000000000000003\n\u003e R13: 0000000000000000 R14: 0000000000000000 R15: ffff88883fff0940\n\u003e FS:  00007fc4b8124740(0000) GS:ffff888827c00000(0000) knlGS:0000000000000000\n\u003e CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n\u003e CR2: 00000000000033f3 CR3: 000000026cc08004 CR4: 0000000000770ee0\n\u003e DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n\u003e DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\n\u003e PKRU: 55555554\n\u003e Call Trace:\n\u003e  \u003cTASK\u003e\n\u003e ? __die\n\u003e ? page_fault_oops\n\u003e ? __pte_offset_map_lock\n\u003e ? exc_page_fault\n\u003e ? asm_exc_page_fault\n\u003e ? wakeup_kswapd\n\u003e migrate_misplaced_page\n\u003e __handle_mm_fault\n\u003e handle_mm_fault\n\u003e do_user_addr_fault\n\u003e exc_page_fault\n\u003e asm_exc_page_fault\n\u003e RIP: 0033:0x55b897ba0808\n\u003e Code: (omitted)\n\u003e RSP: 002b:00007ffeefa821a0 EFLAGS: 00010287\n\u003e RAX: 000055b89983acd0 RBX: 00007ffeefa823f8 RCX: 000055b89983acd0\n\u003e RDX: 00007fc2f8122010 RSI: 0000000000020000 RDI: 000055b89983acd0\n\u003e RBP: 00007ffeefa821a0 R08: 0000000000000037 R09: 0000000000000075\n\u003e R10: 0000000000000000 R11: 0000000000000202 R12: 0000000000000000\n\u003e R13: 00007ffeefa82410 R14: 000055b897ba5dd8 R15: 00007fc4b8340000\n\u003e  \u003c/TASK\u003e",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26783",
          "url": "https://www.suse.com/security/cve/CVE-2024-26783"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222615 for CVE-2024-26783",
          "url": "https://bugzilla.suse.com/1222615"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T09:29:37Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26783"
    },
    {
      "cve": "CVE-2024-26787",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26787"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmmc: mmci: stm32: fix DMA API overlapping mappings warning\n\nTurning on CONFIG_DMA_API_DEBUG_SG results in the following warning:\n\nDMA-API: mmci-pl18x 48220000.mmc: cacheline tracking EEXIST,\noverlapping mappings aren\u0027t supported\nWARNING: CPU: 1 PID: 51 at kernel/dma/debug.c:568\nadd_dma_entry+0x234/0x2f4\nModules linked in:\nCPU: 1 PID: 51 Comm: kworker/1:2 Not tainted 6.1.28 #1\nHardware name: STMicroelectronics STM32MP257F-EV1 Evaluation Board (DT)\nWorkqueue: events_freezable mmc_rescan\nCall trace:\nadd_dma_entry+0x234/0x2f4\ndebug_dma_map_sg+0x198/0x350\n__dma_map_sg_attrs+0xa0/0x110\ndma_map_sg_attrs+0x10/0x2c\nsdmmc_idma_prep_data+0x80/0xc0\nmmci_prep_data+0x38/0x84\nmmci_start_data+0x108/0x2dc\nmmci_request+0xe4/0x190\n__mmc_start_request+0x68/0x140\nmmc_start_request+0x94/0xc0\nmmc_wait_for_req+0x70/0x100\nmmc_send_tuning+0x108/0x1ac\nsdmmc_execute_tuning+0x14c/0x210\nmmc_execute_tuning+0x48/0xec\nmmc_sd_init_uhs_card.part.0+0x208/0x464\nmmc_sd_init_card+0x318/0x89c\nmmc_attach_sd+0xe4/0x180\nmmc_rescan+0x244/0x320\n\nDMA API debug brings to light leaking dma-mappings as dma_map_sg and\ndma_unmap_sg are not correctly balanced.\n\nIf an error occurs in mmci_cmd_irq function, only mmci_dma_error\nfunction is called and as this API is not managed on stm32 variant,\ndma_unmap_sg is never called in this error path.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26787",
          "url": "https://www.suse.com/security/cve/CVE-2024-26787"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222781 for CVE-2024-26787",
          "url": "https://bugzilla.suse.com/1222781"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T09:29:37Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26787"
    },
    {
      "cve": "CVE-2024-26790",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26790"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndmaengine: fsl-qdma: fix SoC may hang on 16 byte unaligned read\n\nThere is chip (ls1028a) errata:\n\nThe SoC may hang on 16 byte unaligned read transactions by QDMA.\n\nUnaligned read transactions initiated by QDMA may stall in the NOC\n(Network On-Chip), causing a deadlock condition. Stalled transactions will\ntrigger completion timeouts in PCIe controller.\n\nWorkaround:\nEnable prefetch by setting the source descriptor prefetchable bit\n( SD[PF] = 1 ).\n\nImplement this workaround.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26790",
          "url": "https://www.suse.com/security/cve/CVE-2024-26790"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222784 for CVE-2024-26790",
          "url": "https://bugzilla.suse.com/1222784"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T09:29:37Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26790"
    },
    {
      "cve": "CVE-2024-26792",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26792"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: fix double free of anonymous device after snapshot creation failure\n\nWhen creating a snapshot we may do a double free of an anonymous device\nin case there\u0027s an error committing the transaction. The second free may\nresult in freeing an anonymous device number that was allocated by some\nother subsystem in the kernel or another btrfs filesystem.\n\nThe steps that lead to this:\n\n1) At ioctl.c:create_snapshot() we allocate an anonymous device number\n   and assign it to pending_snapshot-\u003eanon_dev;\n\n2) Then we call btrfs_commit_transaction() and end up at\n   transaction.c:create_pending_snapshot();\n\n3) There we call btrfs_get_new_fs_root() and pass it the anonymous device\n   number stored in pending_snapshot-\u003eanon_dev;\n\n4) btrfs_get_new_fs_root() frees that anonymous device number because\n   btrfs_lookup_fs_root() returned a root - someone else did a lookup\n   of the new root already, which could some task doing backref walking;\n\n5) After that some error happens in the transaction commit path, and at\n   ioctl.c:create_snapshot() we jump to the \u0027fail\u0027 label, and after\n   that we free again the same anonymous device number, which in the\n   meanwhile may have been reallocated somewhere else, because\n   pending_snapshot-\u003eanon_dev still has the same value as in step 1.\n\nRecently syzbot ran into this and reported the following trace:\n\n  ------------[ cut here ]------------\n  ida_free called for id=51 which is not allocated.\n  WARNING: CPU: 1 PID: 31038 at lib/idr.c:525 ida_free+0x370/0x420 lib/idr.c:525\n  Modules linked in:\n  CPU: 1 PID: 31038 Comm: syz-executor.2 Not tainted 6.8.0-rc4-syzkaller-00410-gc02197fc9076 #0\n  Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024\n  RIP: 0010:ida_free+0x370/0x420 lib/idr.c:525\n  Code: 10 42 80 3c 28 (...)\n  RSP: 0018:ffffc90015a67300 EFLAGS: 00010246\n  RAX: be5130472f5dd000 RBX: 0000000000000033 RCX: 0000000000040000\n  RDX: ffffc90009a7a000 RSI: 000000000003ffff RDI: 0000000000040000\n  RBP: ffffc90015a673f0 R08: ffffffff81577992 R09: 1ffff92002b4cdb4\n  R10: dffffc0000000000 R11: fffff52002b4cdb5 R12: 0000000000000246\n  R13: dffffc0000000000 R14: ffffffff8e256b80 R15: 0000000000000246\n  FS:  00007fca3f4b46c0(0000) GS:ffff8880b9500000(0000) knlGS:0000000000000000\n  CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n  CR2: 00007f167a17b978 CR3: 000000001ed26000 CR4: 0000000000350ef0\n  Call Trace:\n   \u003cTASK\u003e\n   btrfs_get_root_ref+0xa48/0xaf0 fs/btrfs/disk-io.c:1346\n   create_pending_snapshot+0xff2/0x2bc0 fs/btrfs/transaction.c:1837\n   create_pending_snapshots+0x195/0x1d0 fs/btrfs/transaction.c:1931\n   btrfs_commit_transaction+0xf1c/0x3740 fs/btrfs/transaction.c:2404\n   create_snapshot+0x507/0x880 fs/btrfs/ioctl.c:848\n   btrfs_mksubvol+0x5d0/0x750 fs/btrfs/ioctl.c:998\n   btrfs_mksnapshot+0xb5/0xf0 fs/btrfs/ioctl.c:1044\n   __btrfs_ioctl_snap_create+0x387/0x4b0 fs/btrfs/ioctl.c:1306\n   btrfs_ioctl_snap_create_v2+0x1ca/0x400 fs/btrfs/ioctl.c:1393\n   btrfs_ioctl+0xa74/0xd40\n   vfs_ioctl fs/ioctl.c:51 [inline]\n   __do_sys_ioctl fs/ioctl.c:871 [inline]\n   __se_sys_ioctl+0xfe/0x170 fs/ioctl.c:857\n   do_syscall_64+0xfb/0x240\n   entry_SYSCALL_64_after_hwframe+0x6f/0x77\n  RIP: 0033:0x7fca3e67dda9\n  Code: 28 00 00 00 (...)\n  RSP: 002b:00007fca3f4b40c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010\n  RAX: ffffffffffffffda RBX: 00007fca3e7abf80 RCX: 00007fca3e67dda9\n  RDX: 00000000200005c0 RSI: 0000000050009417 RDI: 0000000000000003\n  RBP: 00007fca3e6ca47a R08: 0000000000000000 R09: 0000000000000000\n  R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000\n  R13: 000000000000000b R14: 00007fca3e7abf80 R15: 00007fff6bf95658\n   \u003c/TASK\u003e\n\nWhere we get an explicit message where we attempt to free an anonymous\ndevice number that is not currently allocated. It happens in a different\ncode path from the example below, at btrfs_get_root_ref(), so this change\nmay not fix the case triggered by sy\n---truncated---",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26792",
          "url": "https://www.suse.com/security/cve/CVE-2024-26792"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222430 for CVE-2024-26792",
          "url": "https://bugzilla.suse.com/1222430"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T09:29:37Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26792"
    },
    {
      "cve": "CVE-2024-26793",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26793"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ngtp: fix use-after-free and null-ptr-deref in gtp_newlink()\n\nThe gtp_link_ops operations structure for the subsystem must be\nregistered after registering the gtp_net_ops pernet operations structure.\n\nSyzkaller hit \u0027general protection fault in gtp_genl_dump_pdp\u0027 bug:\n\n[ 1010.702740] gtp: GTP module unloaded\n[ 1010.715877] general protection fault, probably for non-canonical address 0xdffffc0000000001: 0000 [#1] SMP KASAN NOPTI\n[ 1010.715888] KASAN: null-ptr-deref in range [0x0000000000000008-0x000000000000000f]\n[ 1010.715895] CPU: 1 PID: 128616 Comm: a.out Not tainted 6.8.0-rc6-std-def-alt1 #1\n[ 1010.715899] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.0-alt1 04/01/2014\n[ 1010.715908] RIP: 0010:gtp_newlink+0x4d7/0x9c0 [gtp]\n[ 1010.715915] Code: 80 3c 02 00 0f 85 41 04 00 00 48 8b bb d8 05 00 00 e8 ed f6 ff ff 48 89 c2 48 89 c5 48 b8 00 00 00 00 00 fc ff df 48 c1 ea 03 \u003c80\u003e 3c 02 00 0f 85 4f 04 00 00 4c 89 e2 4c 8b 6d 00 48 b8 00 00 00\n[ 1010.715920] RSP: 0018:ffff888020fbf180 EFLAGS: 00010203\n[ 1010.715929] RAX: dffffc0000000000 RBX: ffff88800399c000 RCX: 0000000000000000\n[ 1010.715933] RDX: 0000000000000001 RSI: ffffffff84805280 RDI: 0000000000000282\n[ 1010.715938] RBP: 000000000000000d R08: 0000000000000001 R09: 0000000000000000\n[ 1010.715942] R10: 0000000000000001 R11: 0000000000000001 R12: ffff88800399cc80\n[ 1010.715947] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000400\n[ 1010.715953] FS:  00007fd1509ab5c0(0000) GS:ffff88805b300000(0000) knlGS:0000000000000000\n[ 1010.715958] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[ 1010.715962] CR2: 0000000000000000 CR3: 000000001c07a000 CR4: 0000000000750ee0\n[ 1010.715968] PKRU: 55555554\n[ 1010.715972] Call Trace:\n[ 1010.715985]  ? __die_body.cold+0x1a/0x1f\n[ 1010.715995]  ? die_addr+0x43/0x70\n[ 1010.716002]  ? exc_general_protection+0x199/0x2f0\n[ 1010.716016]  ? asm_exc_general_protection+0x1e/0x30\n[ 1010.716026]  ? gtp_newlink+0x4d7/0x9c0 [gtp]\n[ 1010.716034]  ? gtp_net_exit+0x150/0x150 [gtp]\n[ 1010.716042]  __rtnl_newlink+0x1063/0x1700\n[ 1010.716051]  ? rtnl_setlink+0x3c0/0x3c0\n[ 1010.716063]  ? is_bpf_text_address+0xc0/0x1f0\n[ 1010.716070]  ? kernel_text_address.part.0+0xbb/0xd0\n[ 1010.716076]  ? __kernel_text_address+0x56/0xa0\n[ 1010.716084]  ? unwind_get_return_address+0x5a/0xa0\n[ 1010.716091]  ? create_prof_cpu_mask+0x30/0x30\n[ 1010.716098]  ? arch_stack_walk+0x9e/0xf0\n[ 1010.716106]  ? stack_trace_save+0x91/0xd0\n[ 1010.716113]  ? stack_trace_consume_entry+0x170/0x170\n[ 1010.716121]  ? __lock_acquire+0x15c5/0x5380\n[ 1010.716139]  ? mark_held_locks+0x9e/0xe0\n[ 1010.716148]  ? kmem_cache_alloc_trace+0x35f/0x3c0\n[ 1010.716155]  ? __rtnl_newlink+0x1700/0x1700\n[ 1010.716160]  rtnl_newlink+0x69/0xa0\n[ 1010.716166]  rtnetlink_rcv_msg+0x43b/0xc50\n[ 1010.716172]  ? rtnl_fdb_dump+0x9f0/0x9f0\n[ 1010.716179]  ? lock_acquire+0x1fe/0x560\n[ 1010.716188]  ? netlink_deliver_tap+0x12f/0xd50\n[ 1010.716196]  netlink_rcv_skb+0x14d/0x440\n[ 1010.716202]  ? rtnl_fdb_dump+0x9f0/0x9f0\n[ 1010.716208]  ? netlink_ack+0xab0/0xab0\n[ 1010.716213]  ? netlink_deliver_tap+0x202/0xd50\n[ 1010.716220]  ? netlink_deliver_tap+0x218/0xd50\n[ 1010.716226]  ? __virt_addr_valid+0x30b/0x590\n[ 1010.716233]  netlink_unicast+0x54b/0x800\n[ 1010.716240]  ? netlink_attachskb+0x870/0x870\n[ 1010.716248]  ? __check_object_size+0x2de/0x3b0\n[ 1010.716254]  netlink_sendmsg+0x938/0xe40\n[ 1010.716261]  ? netlink_unicast+0x800/0x800\n[ 1010.716269]  ? __import_iovec+0x292/0x510\n[ 1010.716276]  ? netlink_unicast+0x800/0x800\n[ 1010.716284]  __sock_sendmsg+0x159/0x190\n[ 1010.716290]  ____sys_sendmsg+0x712/0x880\n[ 1010.716297]  ? sock_write_iter+0x3d0/0x3d0\n[ 1010.716304]  ? __ia32_sys_recvmmsg+0x270/0x270\n[ 1010.716309]  ? lock_acquire+0x1fe/0x560\n[ 1010.716315]  ? drain_array_locked+0x90/0x90\n[ 1010.716324]  ___sys_sendmsg+0xf8/0x170\n[ 1010.716331]  ? sendmsg_copy_msghdr+0x170/0x170\n[ 1010.716337]  ? lockdep_init_map\n---truncated---",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26793",
          "url": "https://www.suse.com/security/cve/CVE-2024-26793"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222428 for CVE-2024-26793",
          "url": "https://bugzilla.suse.com/1222428"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T09:29:37Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26793"
    },
    {
      "cve": "CVE-2024-26798",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26798"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfbcon: always restore the old font data in fbcon_do_set_font()\n\nCommit a5a923038d70 (fbdev: fbcon: Properly revert changes when\nvc_resize() failed) started restoring old font data upon failure (of\nvc_resize()). But it performs so only for user fonts. It means that the\n\"system\"/internal fonts are not restored at all. So in result, the very\nfirst call to fbcon_do_set_font() performs no restore at all upon\nfailing vc_resize().\n\nThis can be reproduced by Syzkaller to crash the system on the next\ninvocation of font_get(). It\u0027s rather hard to hit the allocation failure\nin vc_resize() on the first font_set(), but not impossible. Esp. if\nfault injection is used to aid the execution/failure. It was\ndemonstrated by Sirius:\n  BUG: unable to handle page fault for address: fffffffffffffff8\n  #PF: supervisor read access in kernel mode\n  #PF: error_code(0x0000) - not-present page\n  PGD cb7b067 P4D cb7b067 PUD cb7d067 PMD 0\n  Oops: 0000 [#1] PREEMPT SMP KASAN\n  CPU: 1 PID: 8007 Comm: poc Not tainted 6.7.0-g9d1694dc91ce #20\n  Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.15.0-1 04/01/2014\n  RIP: 0010:fbcon_get_font+0x229/0x800 drivers/video/fbdev/core/fbcon.c:2286\n  Call Trace:\n   \u003cTASK\u003e\n   con_font_get drivers/tty/vt/vt.c:4558 [inline]\n   con_font_op+0x1fc/0xf20 drivers/tty/vt/vt.c:4673\n   vt_k_ioctl drivers/tty/vt/vt_ioctl.c:474 [inline]\n   vt_ioctl+0x632/0x2ec0 drivers/tty/vt/vt_ioctl.c:752\n   tty_ioctl+0x6f8/0x1570 drivers/tty/tty_io.c:2803\n   vfs_ioctl fs/ioctl.c:51 [inline]\n  ...\n\nSo restore the font data in any case, not only for user fonts. Note the\nlater \u0027if\u0027 is now protected by \u0027old_userfont\u0027 and not \u0027old_data\u0027 as the\nlatter is always set now. (And it is supposed to be non-NULL. Otherwise\nwe would see the bug above again.)",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26798",
          "url": "https://www.suse.com/security/cve/CVE-2024-26798"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222798 for CVE-2024-26798",
          "url": "https://bugzilla.suse.com/1222798"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T09:29:37Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26798"
    },
    {
      "cve": "CVE-2024-26805",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26805"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetlink: Fix kernel-infoleak-after-free in __skb_datagram_iter\n\nsyzbot reported the following uninit-value access issue [1]:\n\nnetlink_to_full_skb() creates a new `skb` and puts the `skb-\u003edata`\npassed as a 1st arg of netlink_to_full_skb() onto new `skb`. The data\nsize is specified as `len` and passed to skb_put_data(). This `len`\nis based on `skb-\u003eend` that is not data offset but buffer offset. The\n`skb-\u003eend` contains data and tailroom. Since the tailroom is not\ninitialized when the new `skb` created, KMSAN detects uninitialized\nmemory area when copying the data.\n\nThis patch resolved this issue by correct the len from `skb-\u003eend` to\n`skb-\u003elen`, which is the actual data offset.\n\nBUG: KMSAN: kernel-infoleak-after-free in instrument_copy_to_user include/linux/instrumented.h:114 [inline]\nBUG: KMSAN: kernel-infoleak-after-free in copy_to_user_iter lib/iov_iter.c:24 [inline]\nBUG: KMSAN: kernel-infoleak-after-free in iterate_ubuf include/linux/iov_iter.h:29 [inline]\nBUG: KMSAN: kernel-infoleak-after-free in iterate_and_advance2 include/linux/iov_iter.h:245 [inline]\nBUG: KMSAN: kernel-infoleak-after-free in iterate_and_advance include/linux/iov_iter.h:271 [inline]\nBUG: KMSAN: kernel-infoleak-after-free in _copy_to_iter+0x364/0x2520 lib/iov_iter.c:186\n instrument_copy_to_user include/linux/instrumented.h:114 [inline]\n copy_to_user_iter lib/iov_iter.c:24 [inline]\n iterate_ubuf include/linux/iov_iter.h:29 [inline]\n iterate_and_advance2 include/linux/iov_iter.h:245 [inline]\n iterate_and_advance include/linux/iov_iter.h:271 [inline]\n _copy_to_iter+0x364/0x2520 lib/iov_iter.c:186\n copy_to_iter include/linux/uio.h:197 [inline]\n simple_copy_to_iter+0x68/0xa0 net/core/datagram.c:532\n __skb_datagram_iter+0x123/0xdc0 net/core/datagram.c:420\n skb_copy_datagram_iter+0x5c/0x200 net/core/datagram.c:546\n skb_copy_datagram_msg include/linux/skbuff.h:3960 [inline]\n packet_recvmsg+0xd9c/0x2000 net/packet/af_packet.c:3482\n sock_recvmsg_nosec net/socket.c:1044 [inline]\n sock_recvmsg net/socket.c:1066 [inline]\n sock_read_iter+0x467/0x580 net/socket.c:1136\n call_read_iter include/linux/fs.h:2014 [inline]\n new_sync_read fs/read_write.c:389 [inline]\n vfs_read+0x8f6/0xe00 fs/read_write.c:470\n ksys_read+0x20f/0x4c0 fs/read_write.c:613\n __do_sys_read fs/read_write.c:623 [inline]\n __se_sys_read fs/read_write.c:621 [inline]\n __x64_sys_read+0x93/0xd0 fs/read_write.c:621\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n do_syscall_64+0x44/0x110 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x63/0x6b\n\nUninit was stored to memory at:\n skb_put_data include/linux/skbuff.h:2622 [inline]\n netlink_to_full_skb net/netlink/af_netlink.c:181 [inline]\n __netlink_deliver_tap_skb net/netlink/af_netlink.c:298 [inline]\n __netlink_deliver_tap+0x5be/0xc90 net/netlink/af_netlink.c:325\n netlink_deliver_tap net/netlink/af_netlink.c:338 [inline]\n netlink_deliver_tap_kernel net/netlink/af_netlink.c:347 [inline]\n netlink_unicast_kernel net/netlink/af_netlink.c:1341 [inline]\n netlink_unicast+0x10f1/0x1250 net/netlink/af_netlink.c:1368\n netlink_sendmsg+0x1238/0x13d0 net/netlink/af_netlink.c:1910\n sock_sendmsg_nosec net/socket.c:730 [inline]\n __sock_sendmsg net/socket.c:745 [inline]\n ____sys_sendmsg+0x9c2/0xd60 net/socket.c:2584\n ___sys_sendmsg+0x28d/0x3c0 net/socket.c:2638\n __sys_sendmsg net/socket.c:2667 [inline]\n __do_sys_sendmsg net/socket.c:2676 [inline]\n __se_sys_sendmsg net/socket.c:2674 [inline]\n __x64_sys_sendmsg+0x307/0x490 net/socket.c:2674\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n do_syscall_64+0x44/0x110 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x63/0x6b\n\nUninit was created at:\n free_pages_prepare mm/page_alloc.c:1087 [inline]\n free_unref_page_prepare+0xb0/0xa40 mm/page_alloc.c:2347\n free_unref_page_list+0xeb/0x1100 mm/page_alloc.c:2533\n release_pages+0x23d3/0x2410 mm/swap.c:1042\n free_pages_and_swap_cache+0xd9/0xf0 mm/swap_state.c:316\n tlb_batch_pages\n---truncated---",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26805",
          "url": "https://www.suse.com/security/cve/CVE-2024-26805"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222630 for CVE-2024-26805",
          "url": "https://bugzilla.suse.com/1222630"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T09:29:37Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26805"
    },
    {
      "cve": "CVE-2024-26807",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26807"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nBoth cadence-quadspi -\u003eruntime_suspend() and -\u003eruntime_resume()\nimplementations start with:\n\n\tstruct cqspi_st *cqspi = dev_get_drvdata(dev);\n\tstruct spi_controller *host = dev_get_drvdata(dev);\n\nThis obviously cannot be correct, unless \"struct cqspi_st\" is the\nfirst member of \" struct spi_controller\", or the other way around, but\nit is not the case. \"struct spi_controller\" is allocated by\ndevm_spi_alloc_host(), which allocates an extra amount of memory for\nprivate data, used to store \"struct cqspi_st\".\n\nThe -\u003eprobe() function of the cadence-quadspi driver then sets the\ndevice drvdata to store the address of the \"struct cqspi_st\"\nstructure. Therefore:\n\n\tstruct cqspi_st *cqspi = dev_get_drvdata(dev);\n\nis correct, but:\n\n\tstruct spi_controller *host = dev_get_drvdata(dev);\n\nis not, as it makes \"host\" point not to a \"struct spi_controller\" but\nto the same \"struct cqspi_st\" structure as above.\n\nThis obviously leads to bad things (memory corruption, kernel crashes)\ndirectly during -\u003eprobe(), as -\u003eprobe() enables the device using PM\nruntime, leading the -\u003eruntime_resume() hook being called, which in\nturns calls spi_controller_resume() with the wrong pointer.\n\nThis has at least been reported [0] to cause a kernel crash, but the\nexact behavior will depend on the memory contents.\n\n[0] https://lore.kernel.org/all/20240226121803.5a7r5wkpbbowcxgx@dhruva/\n\nThis issue potentially affects all platforms that are currently using\nthe cadence-quadspi driver.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26807",
          "url": "https://www.suse.com/security/cve/CVE-2024-26807"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222801 for CVE-2024-26807",
          "url": "https://bugzilla.suse.com/1222801"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T09:29:37Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26807"
    },
    {
      "cve": "CVE-2024-26816",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26816"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nx86, relocs: Ignore relocations in .notes section\n\nWhen building with CONFIG_XEN_PV=y, .text symbols are emitted into\nthe .notes section so that Xen can find the \"startup_xen\" entry point.\nThis information is used prior to booting the kernel, so relocations\nare not useful. In fact, performing relocations against the .notes\nsection means that the KASLR base is exposed since /sys/kernel/notes\nis world-readable.\n\nTo avoid leaking the KASLR base without breaking unprivileged tools that\nare expecting to read /sys/kernel/notes, skip performing relocations in\nthe .notes section. The values readable in .notes are then identical to\nthose found in System.map.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26816",
          "url": "https://www.suse.com/security/cve/CVE-2024-26816"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222624 for CVE-2024-26816",
          "url": "https://bugzilla.suse.com/1222624"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T09:29:37Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26816"
    },
    {
      "cve": "CVE-2024-26817",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26817"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\namdkfd: use calloc instead of kzalloc to avoid integer overflow\n\nThis uses calloc instead of doing the multiplication which might\noverflow.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26817",
          "url": "https://www.suse.com/security/cve/CVE-2024-26817"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222812 for CVE-2024-26817",
          "url": "https://bugzilla.suse.com/1222812"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T09:29:37Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26817"
    },
    {
      "cve": "CVE-2024-26820",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26820"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nhv_netvsc: Register VF in netvsc_probe if NET_DEVICE_REGISTER missed\n\nIf hv_netvsc driver is unloaded and reloaded, the NET_DEVICE_REGISTER\nhandler cannot perform VF register successfully as the register call\nis received before netvsc_probe is finished. This is because we\nregister register_netdevice_notifier() very early( even before\nvmbus_driver_register()).\nTo fix this, we try to register each such matching VF( if it is visible\nas a netdevice) at the end of netvsc_probe.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26820",
          "url": "https://www.suse.com/security/cve/CVE-2024-26820"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223078 for CVE-2024-26820",
          "url": "https://bugzilla.suse.com/1223078"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T09:29:37Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26820"
    },
    {
      "cve": "CVE-2024-26825",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26825"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnfc: nci: free rx_data_reassembly skb on NCI device cleanup\n\nrx_data_reassembly skb is stored during NCI data exchange for processing\nfragmented packets. It is dropped only when the last fragment is processed\nor when an NTF packet with NCI_OP_RF_DEACTIVATE_NTF opcode is received.\nHowever, the NCI device may be deallocated before that which leads to skb\nleak.\n\nAs by design the rx_data_reassembly skb is bound to the NCI device and\nnothing prevents the device to be freed before the skb is processed in\nsome way and cleaned, free it on the NCI device cleanup.\n\nFound by Linux Verification Center (linuxtesting.org) with Syzkaller.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26825",
          "url": "https://www.suse.com/security/cve/CVE-2024-26825"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223065 for CVE-2024-26825",
          "url": "https://bugzilla.suse.com/1223065"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T09:29:37Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26825"
    },
    {
      "cve": "CVE-2024-26830",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26830"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ni40e: Do not allow untrusted VF to remove administratively set MAC\n\nCurrently when PF administratively sets VF\u0027s MAC address and the VF\nis put down (VF tries to delete all MACs) then the MAC is removed\nfrom MAC filters and primary VF MAC is zeroed.\n\nDo not allow untrusted VF to remove primary MAC when it was set\nadministratively by PF.\n\nReproducer:\n1) Create VF\n2) Set VF interface up\n3) Administratively set the VF\u0027s MAC\n4) Put VF interface down\n\n[root@host ~]# echo 1 \u003e /sys/class/net/enp2s0f0/device/sriov_numvfs\n[root@host ~]# ip link set enp2s0f0v0 up\n[root@host ~]# ip link set enp2s0f0 vf 0 mac fe:6c:b5:da:c7:7d\n[root@host ~]# ip link show enp2s0f0\n23: enp2s0f0: \u003cBROADCAST,MULTICAST,UP,LOWER_UP\u003e mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000\n    link/ether 3c:ec:ef:b7:dd:04 brd ff:ff:ff:ff:ff:ff\n    vf 0     link/ether fe:6c:b5:da:c7:7d brd ff:ff:ff:ff:ff:ff, spoof checking on, link-state auto, trust off\n[root@host ~]# ip link set enp2s0f0v0 down\n[root@host ~]# ip link show enp2s0f0\n23: enp2s0f0: \u003cBROADCAST,MULTICAST,UP,LOWER_UP\u003e mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000\n    link/ether 3c:ec:ef:b7:dd:04 brd ff:ff:ff:ff:ff:ff\n    vf 0     link/ether 00:00:00:00:00:00 brd ff:ff:ff:ff:ff:ff, spoof checking on, link-state auto, trust off",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26830",
          "url": "https://www.suse.com/security/cve/CVE-2024-26830"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223012 for CVE-2024-26830",
          "url": "https://bugzilla.suse.com/1223012"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T09:29:37Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26830"
    },
    {
      "cve": "CVE-2024-26833",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26833"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/display: Fix memory leak in dm_sw_fini()\n\nAfter destroying dmub_srv, the memory associated with it is\nnot freed, causing a memory leak:\n\nunreferenced object 0xffff896302b45800 (size 1024):\n  comm \"(udev-worker)\", pid 222, jiffies 4294894636\n  hex dump (first 32 bytes):\n    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................\n    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................\n  backtrace (crc 6265fd77):\n    [\u003cffffffff993495ed\u003e] kmalloc_trace+0x29d/0x340\n    [\u003cffffffffc0ea4a94\u003e] dm_dmub_sw_init+0xb4/0x450 [amdgpu]\n    [\u003cffffffffc0ea4e55\u003e] dm_sw_init+0x15/0x2b0 [amdgpu]\n    [\u003cffffffffc0ba8557\u003e] amdgpu_device_init+0x1417/0x24e0 [amdgpu]\n    [\u003cffffffffc0bab285\u003e] amdgpu_driver_load_kms+0x15/0x190 [amdgpu]\n    [\u003cffffffffc0ba09c7\u003e] amdgpu_pci_probe+0x187/0x4e0 [amdgpu]\n    [\u003cffffffff9968fd1e\u003e] local_pci_probe+0x3e/0x90\n    [\u003cffffffff996918a3\u003e] pci_device_probe+0xc3/0x230\n    [\u003cffffffff99805872\u003e] really_probe+0xe2/0x480\n    [\u003cffffffff99805c98\u003e] __driver_probe_device+0x78/0x160\n    [\u003cffffffff99805daf\u003e] driver_probe_device+0x1f/0x90\n    [\u003cffffffff9980601e\u003e] __driver_attach+0xce/0x1c0\n    [\u003cffffffff99803170\u003e] bus_for_each_dev+0x70/0xc0\n    [\u003cffffffff99804822\u003e] bus_add_driver+0x112/0x210\n    [\u003cffffffff99807245\u003e] driver_register+0x55/0x100\n    [\u003cffffffff990012d1\u003e] do_one_initcall+0x41/0x300\n\nFix this by freeing dmub_srv after destroying it.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26833",
          "url": "https://www.suse.com/security/cve/CVE-2024-26833"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223036 for CVE-2024-26833",
          "url": "https://bugzilla.suse.com/1223036"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T09:29:37Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26833"
    },
    {
      "cve": "CVE-2024-26836",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26836"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nplatform/x86: think-lmi: Fix password opcode ordering for workstations\n\nThe Lenovo workstations require the password opcode to be run before\nthe attribute value is changed (if Admin password is enabled).\n\nTested on some Thinkpads to confirm they are OK with this order too.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26836",
          "url": "https://www.suse.com/security/cve/CVE-2024-26836"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222968 for CVE-2024-26836",
          "url": "https://bugzilla.suse.com/1222968"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T09:29:37Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26836"
    },
    {
      "cve": "CVE-2024-26843",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26843"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nefi: runtime: Fix potential overflow of soft-reserved region size\n\nmd_size will have been narrowed if we have \u003e= 4GB worth of pages in a\nsoft-reserved region.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26843",
          "url": "https://www.suse.com/security/cve/CVE-2024-26843"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223014 for CVE-2024-26843",
          "url": "https://bugzilla.suse.com/1223014"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T09:29:37Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26843"
    },
    {
      "cve": "CVE-2024-26848",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26848"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26848",
          "url": "https://www.suse.com/security/cve/CVE-2024-26848"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223030 for CVE-2024-26848",
          "url": "https://bugzilla.suse.com/1223030"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T09:29:37Z",
          "details": "low"
        }
      ],
      "title": "CVE-2024-26848"
    },
    {
      "cve": "CVE-2024-26852",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26852"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/ipv6: avoid possible UAF in ip6_route_mpath_notify()\n\nsyzbot found another use-after-free in ip6_route_mpath_notify() [1]\n\nCommit f7225172f25a (\"net/ipv6: prevent use after free in\nip6_route_mpath_notify\") was not able to fix the root cause.\n\nWe need to defer the fib6_info_release() calls after\nip6_route_mpath_notify(), in the cleanup phase.\n\n[1]\nBUG: KASAN: slab-use-after-free in rt6_fill_node+0x1460/0x1ac0\nRead of size 4 at addr ffff88809a07fc64 by task syz-executor.2/23037\n\nCPU: 0 PID: 23037 Comm: syz-executor.2 Not tainted 6.8.0-rc4-syzkaller-01035-gea7f3cfaa588 #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024\nCall Trace:\n \u003cTASK\u003e\n  __dump_stack lib/dump_stack.c:88 [inline]\n  dump_stack_lvl+0x1e7/0x2e0 lib/dump_stack.c:106\n  print_address_description mm/kasan/report.c:377 [inline]\n  print_report+0x167/0x540 mm/kasan/report.c:488\n  kasan_report+0x142/0x180 mm/kasan/report.c:601\n rt6_fill_node+0x1460/0x1ac0\n  inet6_rt_notify+0x13b/0x290 net/ipv6/route.c:6184\n  ip6_route_mpath_notify net/ipv6/route.c:5198 [inline]\n  ip6_route_multipath_add net/ipv6/route.c:5404 [inline]\n  inet6_rtm_newroute+0x1d0f/0x2300 net/ipv6/route.c:5517\n  rtnetlink_rcv_msg+0x885/0x1040 net/core/rtnetlink.c:6597\n  netlink_rcv_skb+0x1e3/0x430 net/netlink/af_netlink.c:2543\n  netlink_unicast_kernel net/netlink/af_netlink.c:1341 [inline]\n  netlink_unicast+0x7ea/0x980 net/netlink/af_netlink.c:1367\n  netlink_sendmsg+0xa3b/0xd70 net/netlink/af_netlink.c:1908\n  sock_sendmsg_nosec net/socket.c:730 [inline]\n  __sock_sendmsg+0x221/0x270 net/socket.c:745\n  ____sys_sendmsg+0x525/0x7d0 net/socket.c:2584\n  ___sys_sendmsg net/socket.c:2638 [inline]\n  __sys_sendmsg+0x2b0/0x3a0 net/socket.c:2667\n do_syscall_64+0xf9/0x240\n entry_SYSCALL_64_after_hwframe+0x6f/0x77\nRIP: 0033:0x7f73dd87dda9\nCode: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 \u003c48\u003e 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48\nRSP: 002b:00007f73de6550c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e\nRAX: ffffffffffffffda RBX: 00007f73dd9ac050 RCX: 00007f73dd87dda9\nRDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000005\nRBP: 00007f73dd8ca47a R08: 0000000000000000 R09: 0000000000000000\nR10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000\nR13: 000000000000006e R14: 00007f73dd9ac050 R15: 00007ffdbdeb7858\n \u003c/TASK\u003e\n\nAllocated by task 23037:\n  kasan_save_stack mm/kasan/common.c:47 [inline]\n  kasan_save_track+0x3f/0x80 mm/kasan/common.c:68\n  poison_kmalloc_redzone mm/kasan/common.c:372 [inline]\n  __kasan_kmalloc+0x98/0xb0 mm/kasan/common.c:389\n  kasan_kmalloc include/linux/kasan.h:211 [inline]\n  __do_kmalloc_node mm/slub.c:3981 [inline]\n  __kmalloc+0x22e/0x490 mm/slub.c:3994\n  kmalloc include/linux/slab.h:594 [inline]\n  kzalloc include/linux/slab.h:711 [inline]\n  fib6_info_alloc+0x2e/0xf0 net/ipv6/ip6_fib.c:155\n  ip6_route_info_create+0x445/0x12b0 net/ipv6/route.c:3758\n  ip6_route_multipath_add net/ipv6/route.c:5298 [inline]\n  inet6_rtm_newroute+0x744/0x2300 net/ipv6/route.c:5517\n  rtnetlink_rcv_msg+0x885/0x1040 net/core/rtnetlink.c:6597\n  netlink_rcv_skb+0x1e3/0x430 net/netlink/af_netlink.c:2543\n  netlink_unicast_kernel net/netlink/af_netlink.c:1341 [inline]\n  netlink_unicast+0x7ea/0x980 net/netlink/af_netlink.c:1367\n  netlink_sendmsg+0xa3b/0xd70 net/netlink/af_netlink.c:1908\n  sock_sendmsg_nosec net/socket.c:730 [inline]\n  __sock_sendmsg+0x221/0x270 net/socket.c:745\n  ____sys_sendmsg+0x525/0x7d0 net/socket.c:2584\n  ___sys_sendmsg net/socket.c:2638 [inline]\n  __sys_sendmsg+0x2b0/0x3a0 net/socket.c:2667\n do_syscall_64+0xf9/0x240\n entry_SYSCALL_64_after_hwframe+0x6f/0x77\n\nFreed by task 16:\n  kasan_save_stack mm/kasan/common.c:47 [inline]\n  kasan_save_track+0x3f/0x80 mm/kasan/common.c:68\n  kasan_save_free_info+0x4e/0x60 mm/kasan/generic.c:640\n  poison_slab_object+0xa6/0xe0 m\n---truncated---",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26852",
          "url": "https://www.suse.com/security/cve/CVE-2024-26852"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223057 for CVE-2024-26852",
          "url": "https://bugzilla.suse.com/1223057"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223059 for CVE-2024-26852",
          "url": "https://bugzilla.suse.com/1223059"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T09:29:37Z",
          "details": "important"
        }
      ],
      "title": "CVE-2024-26852"
    },
    {
      "cve": "CVE-2024-26853",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26853"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nigc: avoid returning frame twice in XDP_REDIRECT\n\nWhen a frame can not be transmitted in XDP_REDIRECT\n(e.g. due to a full queue), it is necessary to free\nit by calling xdp_return_frame_rx_napi.\n\nHowever, this is the responsibility of the caller of\nthe ndo_xdp_xmit (see for example bq_xmit_all in\nkernel/bpf/devmap.c) and thus calling it inside\nigc_xdp_xmit (which is the ndo_xdp_xmit of the igc\ndriver) as well will lead to memory corruption.\n\nIn fact, bq_xmit_all expects that it can return all\nframes after the last successfully transmitted one.\nTherefore, break for the first not transmitted frame,\nbut do not call xdp_return_frame_rx_napi in igc_xdp_xmit.\nThis is equally implemented in other Intel drivers\nsuch as the igb.\n\nThere are two alternatives to this that were rejected:\n1. Return num_frames as all the frames would have been\n   transmitted and release them inside igc_xdp_xmit.\n   While it might work technically, it is not what\n   the return value is meant to represent (i.e. the\n   number of SUCCESSFULLY transmitted packets).\n2. Rework kernel/bpf/devmap.c and all drivers to\n   support non-consecutively dropped packets.\n   Besides being complex, it likely has a negative\n   performance impact without a significant gain\n   since it is anyway unlikely that the next frame\n   can be transmitted if the previous one was dropped.\n\nThe memory corruption can be reproduced with\nthe following script which leads to a kernel panic\nafter a few seconds.  It basically generates more\ntraffic than a i225 NIC can transmit and pushes it\nvia XDP_REDIRECT from a virtual interface to the\nphysical interface where frames get dropped.\n\n   #!/bin/bash\n   INTERFACE=enp4s0\n   INTERFACE_IDX=`cat /sys/class/net/$INTERFACE/ifindex`\n\n   sudo ip link add dev veth1 type veth peer name veth2\n   sudo ip link set up $INTERFACE\n   sudo ip link set up veth1\n   sudo ip link set up veth2\n\n   cat \u003c\u003c EOF \u003e redirect.bpf.c\n\n   SEC(\"prog\")\n   int redirect(struct xdp_md *ctx)\n   {\n       return bpf_redirect($INTERFACE_IDX, 0);\n   }\n\n   char _license[] SEC(\"license\") = \"GPL\";\n   EOF\n   clang -O2 -g -Wall -target bpf -c redirect.bpf.c -o redirect.bpf.o\n   sudo ip link set veth2 xdp obj redirect.bpf.o\n\n   cat \u003c\u003c EOF \u003e pass.bpf.c\n\n   SEC(\"prog\")\n   int pass(struct xdp_md *ctx)\n   {\n       return XDP_PASS;\n   }\n\n   char _license[] SEC(\"license\") = \"GPL\";\n   EOF\n   clang -O2 -g -Wall -target bpf -c pass.bpf.c -o pass.bpf.o\n   sudo ip link set $INTERFACE xdp obj pass.bpf.o\n\n   cat \u003c\u003c EOF \u003e trafgen.cfg\n\n   {\n     /* Ethernet Header */\n     0xe8, 0x6a, 0x64, 0x41, 0xbf, 0x46,\n     0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF,\n     const16(ETH_P_IP),\n\n     /* IPv4 Header */\n     0b01000101, 0,   # IPv4 version, IHL, TOS\n     const16(1028),   # IPv4 total length (UDP length + 20 bytes (IP header))\n     const16(2),      # IPv4 ident\n     0b01000000, 0,   # IPv4 flags, fragmentation off\n     64,              # IPv4 TTL\n     17,              # Protocol UDP\n     csumip(14, 33),  # IPv4 checksum\n\n     /* UDP Header */\n     10,  0, 1, 1,    # IP Src - adapt as needed\n     10,  0, 1, 2,    # IP Dest - adapt as needed\n     const16(6666),   # UDP Src Port\n     const16(6666),   # UDP Dest Port\n     const16(1008),   # UDP length (UDP header 8 bytes + payload length)\n     csumudp(14, 34), # UDP checksum\n\n     /* Payload */\n     fill(\u0027W\u0027, 1000),\n   }\n   EOF\n\n   sudo trafgen -i trafgen.cfg -b3000MB -o veth1 --cpp",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26853",
          "url": "https://www.suse.com/security/cve/CVE-2024-26853"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223061 for CVE-2024-26853",
          "url": "https://bugzilla.suse.com/1223061"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T09:29:37Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26853"
    },
    {
      "cve": "CVE-2024-26855",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26855"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: ice: Fix potential NULL pointer dereference in ice_bridge_setlink()\n\nThe function ice_bridge_setlink() may encounter a NULL pointer dereference\nif nlmsg_find_attr() returns NULL and br_spec is dereferenced subsequently\nin nla_for_each_nested(). To address this issue, add a check to ensure that\nbr_spec is not NULL before proceeding with the nested attribute iteration.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26855",
          "url": "https://www.suse.com/security/cve/CVE-2024-26855"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223051 for CVE-2024-26855",
          "url": "https://bugzilla.suse.com/1223051"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T09:29:37Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26855"
    },
    {
      "cve": "CVE-2024-26856",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26856"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: sparx5: Fix use after free inside sparx5_del_mact_entry\n\nBased on the static analyzis of the code it looks like when an entry\nfrom the MAC table was removed, the entry was still used after being\nfreed. More precise the vid of the mac_entry was used after calling\ndevm_kfree on the mac_entry.\nThe fix consists in first using the vid of the mac_entry to delete the\nentry from the HW and after that to free it.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26856",
          "url": "https://www.suse.com/security/cve/CVE-2024-26856"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223052 for CVE-2024-26856",
          "url": "https://bugzilla.suse.com/1223052"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T09:29:37Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26856"
    },
    {
      "cve": "CVE-2024-26857",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26857"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ngeneve: make sure to pull inner header in geneve_rx()\n\nsyzbot triggered a bug in geneve_rx() [1]\n\nIssue is similar to the one I fixed in commit 8d975c15c0cd\n(\"ip6_tunnel: make sure to pull inner header in __ip6_tnl_rcv()\")\n\nWe have to save skb-\u003enetwork_header in a temporary variable\nin order to be able to recompute the network_header pointer\nafter a pskb_inet_may_pull() call.\n\npskb_inet_may_pull() makes sure the needed headers are in skb-\u003ehead.\n\n[1]\nBUG: KMSAN: uninit-value in IP_ECN_decapsulate include/net/inet_ecn.h:302 [inline]\n BUG: KMSAN: uninit-value in geneve_rx drivers/net/geneve.c:279 [inline]\n BUG: KMSAN: uninit-value in geneve_udp_encap_recv+0x36f9/0x3c10 drivers/net/geneve.c:391\n  IP_ECN_decapsulate include/net/inet_ecn.h:302 [inline]\n  geneve_rx drivers/net/geneve.c:279 [inline]\n  geneve_udp_encap_recv+0x36f9/0x3c10 drivers/net/geneve.c:391\n  udp_queue_rcv_one_skb+0x1d39/0x1f20 net/ipv4/udp.c:2108\n  udp_queue_rcv_skb+0x6ae/0x6e0 net/ipv4/udp.c:2186\n  udp_unicast_rcv_skb+0x184/0x4b0 net/ipv4/udp.c:2346\n  __udp4_lib_rcv+0x1c6b/0x3010 net/ipv4/udp.c:2422\n  udp_rcv+0x7d/0xa0 net/ipv4/udp.c:2604\n  ip_protocol_deliver_rcu+0x264/0x1300 net/ipv4/ip_input.c:205\n  ip_local_deliver_finish+0x2b8/0x440 net/ipv4/ip_input.c:233\n  NF_HOOK include/linux/netfilter.h:314 [inline]\n  ip_local_deliver+0x21f/0x490 net/ipv4/ip_input.c:254\n  dst_input include/net/dst.h:461 [inline]\n  ip_rcv_finish net/ipv4/ip_input.c:449 [inline]\n  NF_HOOK include/linux/netfilter.h:314 [inline]\n  ip_rcv+0x46f/0x760 net/ipv4/ip_input.c:569\n  __netif_receive_skb_one_core net/core/dev.c:5534 [inline]\n  __netif_receive_skb+0x1a6/0x5a0 net/core/dev.c:5648\n  process_backlog+0x480/0x8b0 net/core/dev.c:5976\n  __napi_poll+0xe3/0x980 net/core/dev.c:6576\n  napi_poll net/core/dev.c:6645 [inline]\n  net_rx_action+0x8b8/0x1870 net/core/dev.c:6778\n  __do_softirq+0x1b7/0x7c5 kernel/softirq.c:553\n  do_softirq+0x9a/0xf0 kernel/softirq.c:454\n  __local_bh_enable_ip+0x9b/0xa0 kernel/softirq.c:381\n  local_bh_enable include/linux/bottom_half.h:33 [inline]\n  rcu_read_unlock_bh include/linux/rcupdate.h:820 [inline]\n  __dev_queue_xmit+0x2768/0x51c0 net/core/dev.c:4378\n  dev_queue_xmit include/linux/netdevice.h:3171 [inline]\n  packet_xmit+0x9c/0x6b0 net/packet/af_packet.c:276\n  packet_snd net/packet/af_packet.c:3081 [inline]\n  packet_sendmsg+0x8aef/0x9f10 net/packet/af_packet.c:3113\n  sock_sendmsg_nosec net/socket.c:730 [inline]\n  __sock_sendmsg net/socket.c:745 [inline]\n  __sys_sendto+0x735/0xa10 net/socket.c:2191\n  __do_sys_sendto net/socket.c:2203 [inline]\n  __se_sys_sendto net/socket.c:2199 [inline]\n  __x64_sys_sendto+0x125/0x1c0 net/socket.c:2199\n  do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n  do_syscall_64+0xcf/0x1e0 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x63/0x6b\n\nUninit was created at:\n  slab_post_alloc_hook mm/slub.c:3819 [inline]\n  slab_alloc_node mm/slub.c:3860 [inline]\n  kmem_cache_alloc_node+0x5cb/0xbc0 mm/slub.c:3903\n  kmalloc_reserve+0x13d/0x4a0 net/core/skbuff.c:560\n  __alloc_skb+0x352/0x790 net/core/skbuff.c:651\n  alloc_skb include/linux/skbuff.h:1296 [inline]\n  alloc_skb_with_frags+0xc8/0xbd0 net/core/skbuff.c:6394\n  sock_alloc_send_pskb+0xa80/0xbf0 net/core/sock.c:2783\n  packet_alloc_skb net/packet/af_packet.c:2930 [inline]\n  packet_snd net/packet/af_packet.c:3024 [inline]\n  packet_sendmsg+0x70c2/0x9f10 net/packet/af_packet.c:3113\n  sock_sendmsg_nosec net/socket.c:730 [inline]\n  __sock_sendmsg net/socket.c:745 [inline]\n  __sys_sendto+0x735/0xa10 net/socket.c:2191\n  __do_sys_sendto net/socket.c:2203 [inline]\n  __se_sys_sendto net/socket.c:2199 [inline]\n  __x64_sys_sendto+0x125/0x1c0 net/socket.c:2199\n  do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n  do_syscall_64+0xcf/0x1e0 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x63/0x6b",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26857",
          "url": "https://www.suse.com/security/cve/CVE-2024-26857"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223058 for CVE-2024-26857",
          "url": "https://bugzilla.suse.com/1223058"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T09:29:37Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26857"
    },
    {
      "cve": "CVE-2024-26861",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26861"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwireguard: receive: annotate data-race around receiving_counter.counter\n\nSyzkaller with KCSAN identified a data-race issue when accessing\nkeypair-\u003ereceiving_counter.counter. Use READ_ONCE() and WRITE_ONCE()\nannotations to mark the data race as intentional.\n\n    BUG: KCSAN: data-race in wg_packet_decrypt_worker / wg_packet_rx_poll\n\n    write to 0xffff888107765888 of 8 bytes by interrupt on cpu 0:\n     counter_validate drivers/net/wireguard/receive.c:321 [inline]\n     wg_packet_rx_poll+0x3ac/0xf00 drivers/net/wireguard/receive.c:461\n     __napi_poll+0x60/0x3b0 net/core/dev.c:6536\n     napi_poll net/core/dev.c:6605 [inline]\n     net_rx_action+0x32b/0x750 net/core/dev.c:6738\n     __do_softirq+0xc4/0x279 kernel/softirq.c:553\n     do_softirq+0x5e/0x90 kernel/softirq.c:454\n     __local_bh_enable_ip+0x64/0x70 kernel/softirq.c:381\n     __raw_spin_unlock_bh include/linux/spinlock_api_smp.h:167 [inline]\n     _raw_spin_unlock_bh+0x36/0x40 kernel/locking/spinlock.c:210\n     spin_unlock_bh include/linux/spinlock.h:396 [inline]\n     ptr_ring_consume_bh include/linux/ptr_ring.h:367 [inline]\n     wg_packet_decrypt_worker+0x6c5/0x700 drivers/net/wireguard/receive.c:499\n     process_one_work kernel/workqueue.c:2633 [inline]\n     ...\n\n    read to 0xffff888107765888 of 8 bytes by task 3196 on cpu 1:\n     decrypt_packet drivers/net/wireguard/receive.c:252 [inline]\n     wg_packet_decrypt_worker+0x220/0x700 drivers/net/wireguard/receive.c:501\n     process_one_work kernel/workqueue.c:2633 [inline]\n     process_scheduled_works+0x5b8/0xa30 kernel/workqueue.c:2706\n     worker_thread+0x525/0x730 kernel/workqueue.c:2787\n     ...",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26861",
          "url": "https://www.suse.com/security/cve/CVE-2024-26861"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223076 for CVE-2024-26861",
          "url": "https://bugzilla.suse.com/1223076"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T09:29:37Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26861"
    },
    {
      "cve": "CVE-2024-26862",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26862"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\npacket: annotate data-races around ignore_outgoing\n\nignore_outgoing is read locklessly from dev_queue_xmit_nit()\nand packet_getsockopt()\n\nAdd appropriate READ_ONCE()/WRITE_ONCE() annotations.\n\nsyzbot reported:\n\nBUG: KCSAN: data-race in dev_queue_xmit_nit / packet_setsockopt\n\nwrite to 0xffff888107804542 of 1 bytes by task 22618 on cpu 0:\n packet_setsockopt+0xd83/0xfd0 net/packet/af_packet.c:4003\n do_sock_setsockopt net/socket.c:2311 [inline]\n __sys_setsockopt+0x1d8/0x250 net/socket.c:2334\n __do_sys_setsockopt net/socket.c:2343 [inline]\n __se_sys_setsockopt net/socket.c:2340 [inline]\n __x64_sys_setsockopt+0x66/0x80 net/socket.c:2340\n do_syscall_64+0xd3/0x1d0\n entry_SYSCALL_64_after_hwframe+0x6d/0x75\n\nread to 0xffff888107804542 of 1 bytes by task 27 on cpu 1:\n dev_queue_xmit_nit+0x82/0x620 net/core/dev.c:2248\n xmit_one net/core/dev.c:3527 [inline]\n dev_hard_start_xmit+0xcc/0x3f0 net/core/dev.c:3547\n __dev_queue_xmit+0xf24/0x1dd0 net/core/dev.c:4335\n dev_queue_xmit include/linux/netdevice.h:3091 [inline]\n batadv_send_skb_packet+0x264/0x300 net/batman-adv/send.c:108\n batadv_send_broadcast_skb+0x24/0x30 net/batman-adv/send.c:127\n batadv_iv_ogm_send_to_if net/batman-adv/bat_iv_ogm.c:392 [inline]\n batadv_iv_ogm_emit net/batman-adv/bat_iv_ogm.c:420 [inline]\n batadv_iv_send_outstanding_bat_ogm_packet+0x3f0/0x4b0 net/batman-adv/bat_iv_ogm.c:1700\n process_one_work kernel/workqueue.c:3254 [inline]\n process_scheduled_works+0x465/0x990 kernel/workqueue.c:3335\n worker_thread+0x526/0x730 kernel/workqueue.c:3416\n kthread+0x1d1/0x210 kernel/kthread.c:388\n ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:147\n ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:243\n\nvalue changed: 0x00 -\u003e 0x01\n\nReported by Kernel Concurrency Sanitizer on:\nCPU: 1 PID: 27 Comm: kworker/u8:1 Tainted: G        W          6.8.0-syzkaller-08073-g480e035fc4c7 #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/29/2024\nWorkqueue: bat_events batadv_iv_send_outstanding_bat_ogm_packet",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26862",
          "url": "https://www.suse.com/security/cve/CVE-2024-26862"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223111 for CVE-2024-26862",
          "url": "https://bugzilla.suse.com/1223111"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T09:29:37Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26862"
    },
    {
      "cve": "CVE-2024-26866",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26866"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nspi: lpspi: Avoid potential use-after-free in probe()\n\nfsl_lpspi_probe() is allocating/disposing memory manually with\nspi_alloc_host()/spi_alloc_target(), but uses\ndevm_spi_register_controller(). In case of error after the latter call the\nmemory will be explicitly freed in the probe function by\nspi_controller_put() call, but used afterwards by \"devm\" management outside\nprobe() (spi_unregister_controller() \u003c- devm_spi_unregister() below).\n\nUnable to handle kernel NULL pointer dereference at virtual address 0000000000000070\n...\nCall trace:\n kernfs_find_ns\n kernfs_find_and_get_ns\n sysfs_remove_group\n sysfs_remove_groups\n device_remove_attrs\n device_del\n spi_unregister_controller\n devm_spi_unregister\n release_nodes\n devres_release_all\n really_probe\n driver_probe_device\n __device_attach_driver\n bus_for_each_drv\n __device_attach\n device_initial_probe\n bus_probe_device\n deferred_probe_work_func\n process_one_work\n worker_thread\n kthread\n ret_from_fork",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26866",
          "url": "https://www.suse.com/security/cve/CVE-2024-26866"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223024 for CVE-2024-26866",
          "url": "https://bugzilla.suse.com/1223024"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T09:29:37Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26866"
    },
    {
      "cve": "CVE-2024-26872",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26872"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/srpt: Do not register event handler until srpt device is fully setup\n\nUpon rare occasions, KASAN reports a use-after-free Write\nin srpt_refresh_port().\n\nThis seems to be because an event handler is registered before the\nsrpt device is fully setup and a race condition upon error may leave a\npartially setup event handler in place.\n\nInstead, only register the event handler after srpt device initialization\nis complete.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26872",
          "url": "https://www.suse.com/security/cve/CVE-2024-26872"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223115 for CVE-2024-26872",
          "url": "https://bugzilla.suse.com/1223115"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T09:29:37Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26872"
    },
    {
      "cve": "CVE-2024-26875",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26875"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: pvrusb2: fix uaf in pvr2_context_set_notify\n\n[Syzbot reported]\nBUG: KASAN: slab-use-after-free in pvr2_context_set_notify+0x2c4/0x310 drivers/media/usb/pvrusb2/pvrusb2-context.c:35\nRead of size 4 at addr ffff888113aeb0d8 by task kworker/1:1/26\n\nCPU: 1 PID: 26 Comm: kworker/1:1 Not tainted 6.8.0-rc1-syzkaller-00046-gf1a27f081c1f #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024\nWorkqueue: usb_hub_wq hub_event\nCall Trace:\n \u003cTASK\u003e\n __dump_stack lib/dump_stack.c:88 [inline]\n dump_stack_lvl+0xd9/0x1b0 lib/dump_stack.c:106\n print_address_description mm/kasan/report.c:377 [inline]\n print_report+0xc4/0x620 mm/kasan/report.c:488\n kasan_report+0xda/0x110 mm/kasan/report.c:601\n pvr2_context_set_notify+0x2c4/0x310 drivers/media/usb/pvrusb2/pvrusb2-context.c:35\n pvr2_context_notify drivers/media/usb/pvrusb2/pvrusb2-context.c:95 [inline]\n pvr2_context_disconnect+0x94/0xb0 drivers/media/usb/pvrusb2/pvrusb2-context.c:272\n\nFreed by task 906:\nkasan_save_stack+0x33/0x50 mm/kasan/common.c:47\nkasan_save_track+0x14/0x30 mm/kasan/common.c:68\nkasan_save_free_info+0x3f/0x60 mm/kasan/generic.c:640\npoison_slab_object mm/kasan/common.c:241 [inline]\n__kasan_slab_free+0x106/0x1b0 mm/kasan/common.c:257\nkasan_slab_free include/linux/kasan.h:184 [inline]\nslab_free_hook mm/slub.c:2121 [inline]\nslab_free mm/slub.c:4299 [inline]\nkfree+0x105/0x340 mm/slub.c:4409\npvr2_context_check drivers/media/usb/pvrusb2/pvrusb2-context.c:137 [inline]\npvr2_context_thread_func+0x69d/0x960 drivers/media/usb/pvrusb2/pvrusb2-context.c:158\n\n[Analyze]\nTask A set disconnect_flag = !0, which resulted in Task B\u0027s condition being met\nand releasing mp, leading to this issue.\n\n[Fix]\nPlace the disconnect_flag assignment operation after all code in pvr2_context_disconnect()\nto avoid this issue.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26875",
          "url": "https://www.suse.com/security/cve/CVE-2024-26875"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223118 for CVE-2024-26875",
          "url": "https://bugzilla.suse.com/1223118"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-15T09:29:37Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26875"
    },
    {
      "cve": "CVE-2024-26878",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26878"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nquota: Fix potential NULL pointer dereference\n\nBelow race may cause NULL pointer dereference\n\nP1\t\t\t\t\tP2\ndquot_free_inode\t\t\tquota_off\n\t\t\t\t\t  drop_dquot_ref\n\t\t\t\t\t   remove_dquot_ref\n\t\t\t\t\t   dquots = i_dquot(inode)\n  dquots = i_dquot(inode)\n  srcu_read_lock\n  dquots[cnt]) != NULL (1)\n\t\t\t\t\t     dquots[type] = NULL (2)\n  spin_lock(\u0026dquots[cnt]-\u003edq_dqb_lock) (3)\n   ....\n\nIf dquot_free_inode(or other routines) checks inode\u0027s quota pointers (1)\nbefore quota_off sets it to NULL(2) and use it (3) after that, NULL pointer\ndereference will be triggered.\n\nSo let\u0027s fix it by using a temporary pointer to avoid this issue.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
          "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
          "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
          "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26878",
          "url": "https://www.suse.com/security/cve/CVE-2024-26878"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223060 for CVE-2024-26878",
          "url": "https://bugzilla.suse.com/1223060"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.62.2.x86_64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.62.2.noarch",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.ppc64le",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.s390x",
            "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.62.1.x86_64",
            "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.62.2.s390x",
            "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.62.2.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.62.2.aarch64",